Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4770
Title: An extended approach for SMS security using authentication functions
Authors: Chaudhari, Narendra S.
Keywords: Asymmetric algorithms;Authentication functions;Checksum;Comparative analysis;Diffie Hellman;Error detecting codes;Key exchange protocols;M-commerce;Message authentication codes;Message encryption;Mobile bankings;Mobile Commerce;Non-repudiation;Security issues;SMS messages;SMS security;Value added service;Global system for mobile communications;Hash functions;Industrial electronics;Public key cryptography;Authentication
Issue Date: 2012
Citation: Saxena, N., Chaudhari, N. S., & Prajapati, G. L. (2012). An extended approach for SMS security using authentication functions. Paper presented at the Proceedings of the 2012 7th IEEE Conference on Industrial Electronics and Applications, ICIEA 2012, 663-668. doi:10.1109/ICIEA.2012.6360809
Abstract: Nowadays, security of SMS is a crucial aspect because it plays an important role in value added services and mobile commerce. Asymmetric algorithm like Diffie-Hellman can be used to encrypt the SMS message in M-commerce or mobile banking system. We use authentication functions to maintain the integrity of data. Password key exchange protocol based on Diffie-Hellman algorithm generates a secret shared key which can be used in message encryption and in MAC function. MAC (message authentication code) or hash functions are used maintain the integrity of message and can be used with the encryption. These functions also act as an error detecting code or checksum. This paper discusses the comparative analysis of both the authentication functions separately for password key exchange protocol by analyzing some of the security issues. The discussion of this paper concludes that MAC functions are more secure than hash function, but having greater complexity and take more to execute. So, it's better to use hash function for maintaining the integrity of message over a network where the transmitted amount of message is very small (SMS). Here, digital signature is generated with RSA to show the functionality of MD5 and SHA1, which prevents SMS from message modification and non-repudiation attack. © 2012 IEEE.
URI: https://doi.org/10.1109/ICIEA.2012.6360809
https://dspace.iiti.ac.in/handle/123456789/4770
ISBN: 9781457721175
Type of Material: Conference Paper
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: