2018
DOI: 10.1109/tdsc.2018.2799223
|View full text |Cite
|
Sign up to set email alerts
|

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users

Abstract: Abstract-Short Message Service (SMS) is a widely used communication medium for mobile applications, such as banking, social networking, and e-commerce. Applications of SMS services also include real-time broadcasting messages, such as notification of natural disasters (e.g., bushfires and hurricane) and terrorist attacks, and sharing the current whereabouts to other users, such as notifying urgent business meeting information, transmitting quick information in the battlefield to multiple users, notifying curre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 59 publications
0
5
0
Order By: Relevance
“…Tis solution requires relatively large device resources and is unfeasible to implement in resourceconstrained devices. Saxena et al [17] designed a batch authentication and key agreement protocol for short message service, which mainly transmits information from one user to multiple users over insecure communication channels. However, the cost of this protocol is very high, which is impracticable to implement under the limited conditions of marine equipment.…”
Section: Related Workmentioning
confidence: 99%
“…Tis solution requires relatively large device resources and is unfeasible to implement in resourceconstrained devices. Saxena et al [17] designed a batch authentication and key agreement protocol for short message service, which mainly transmits information from one user to multiple users over insecure communication channels. However, the cost of this protocol is very high, which is impracticable to implement under the limited conditions of marine equipment.…”
Section: Related Workmentioning
confidence: 99%
“…To speed up verification, many related works have been proposed [ 29 , 30 , 31 , 32 , 33 ]. Therefore, to improve verified efficiency, the small exponent test technique [ 34 , 35 ] is applied.…”
Section: The Proposed Schemementioning
confidence: 99%
“…In a re-batch authentication process, the AS first finds all invalid MS i with the help of an algorithm in [45], [48]. Thereafter, the AS removes invalid MS i from the batch and again computes P =…”
Section: Re-batch Authentication Processmentioning
confidence: 99%
“…Reliability of the protocol can be understood as follows [18], [45], [48]. In this protocol, if all MS i are successfully verified then this protocol achieves its maximum reliability with respect to its performance.…”
Section: Re-batch Authentication Processmentioning
confidence: 99%