2008 IEEE Symposium on Computers and Communications 2008
DOI: 10.1109/iscc.2008.4625610
|View full text |Cite
|
Sign up to set email alerts
|

SSMS - A secure SMS messaging protocol for the m-payment systems

Abstract: The GSM network with the greatest worldwide number of users, succumbs to several security vulnerabilities. The Short Message Service (SMS) is one of its superior and well-tried services with a global availability in the GSM networks. The main contribution of this paper is to introduce a new secure application layer protocol, called SSMS, to efficiently embed the desired security attributes in the SMS messages to be used as a secure bearer in the m-payment systems. SSMS efficiently provides confidentiality, int… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
36
0
1

Year Published

2008
2008
2020
2020

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 61 publications
(37 citation statements)
references
References 10 publications
0
36
0
1
Order By: Relevance
“…The SSMS protocol [41] and the Secure Extensible and Efficient SMS (SEESMS) protocol [42], [43] do not provide end-to-end SMS security for mobile users, rather they provide security between a mobile user and the server, which is just a subpart of the problem of this paper and also was the same in EasySMS. These protocols in addition to the protocol in [44] do not focus the communication and computation overheads, prevention from attacks, and the bandwidth utilization.…”
Section: Existing Solutionsmentioning
confidence: 99%
“…The SSMS protocol [41] and the Secure Extensible and Efficient SMS (SEESMS) protocol [42], [43] do not provide end-to-end SMS security for mobile users, rather they provide security between a mobile user and the server, which is just a subpart of the problem of this paper and also was the same in EasySMS. These protocols in addition to the protocol in [44] do not focus the communication and computation overheads, prevention from attacks, and the bandwidth utilization.…”
Section: Existing Solutionsmentioning
confidence: 99%
“…For generate the key in this application used the elliptic curve cryptography. This application provides the low bandwidth and cost effective solution [4]. Another application is also based on the payment system.…”
Section: Related Workmentioning
confidence: 99%
“…It is a technology that enables text messages to be sent and received as same as voice calls. The short message is transmitted over the radio channel using the signaling path [9]. …”
Section: Sms Technologymentioning
confidence: 99%