Research on End-To-End SMS Confidential Communication System

Article Preview

Abstract:

Because of the security vulnerabilities of the GSM network short message communication faces threat of information theft, this paper propose an end-to-end secure communication solution, then elaborate the security of the scheme, introduce the features and system-level architecture. And implement system based on the Iphone4 platform.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1744-1747

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Xie Liang, Wang Hai_hang, Tan Cheng_Xiang, Security SMS application system solutions Computer security, 2007. 8, pp.30-32. (In Chinese).

Google Scholar

[2] Li, Yan; Chen, Meifang ; Nie, Jie, Mobile Commerce Security Model Construction Based on SMS, Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on , pp.1-3.

DOI: 10.1109/wicom.2011.6040460

Google Scholar

[3] Xu Heng, Chen Gong_Liang, Yang Fu_Xiang. Information Security and Communications Privacy, 2009. 02: p.91. (In Chinese).

Google Scholar

[4] Zhao Yong, Rijndael. Sichuan University of Arts and Science University (Natural Science), Sep. 2008, Vol. 18 No. 5: pp.41-42. (In Chinese).

Google Scholar

[5] Nanda, Ashok Kumar ; Awasthi, Lalit Kumar, Encryption based channel coding algorithm for secure SMS, Information and Communication Technologies (WICT), 2011 World Congress on , pp.1282-1287.

DOI: 10.1109/wict.2011.6141433

Google Scholar

[6] Liu, Ruoheng ; Marić, Ivana ; Spasojević, Predrag ; Yates, Roy D. Multi-Terminal Communications with Confidential Messages, Information Theory and Applications Workshop, 2007, pp.370-377.

DOI: 10.1109/ita.2007.4357605

Google Scholar

[7] Willianm Stallings. Cryptography and Network Security - Principles and Practice, Third ed., Liu Yu_Zheng, Wang Li_Na, Fu Jian-Ming translated, Beijing: Electronic Industry Press, 2004, pp.103-22. (In Chinese).

Google Scholar