IJCNIS Vol. 8, No. 1, 8 Jan. 2016
Cover page and Table of Contents: PDF (size: 565KB)
GSM, SMS, GPRS, Message Security, Service Availability, Third Party Scheme
Distributed systems use General Packet Radio Service (GPRS) to exchange information between different members of the system. The members of the system depend critically upon their ability to access internet connection in order to exchange data via GPRS and the system will shut down in case of unavailability of Internet connection. There is a strong need for developing another backup communication media. In this paper a data transaction method based on encoded Short Message Service (SMS) over Global System for Mobile Communication (GSM) is proposed. This new method guarantees the functionality of the system in case of inaccessibility to GPRS which may be not always available due to measures such as attacks that affect its availability. The proposed method is based on third party agent who can keep the address secrecy of both communicators besides keeping confidentiality, integrity and availability.
Mohammed Baqer M. Kamel, Loay E. George, "Secure Model for SMS Exchange over GSM", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.1, pp.1-8, 2016. DOI:10.5815/ijcnis.2016.01.01
[1]M. Kamel and L. George, "Remote Patient Tracking and Monitoring System", International Journal of Computer Science and Mobile Computing, 2013. 2(12): 88-94.
[2]A. Bourouis, M. Feham and A. Bouchachia, "Ubiquitous Mobile Health Monitoring System for Elderly", International Journal of Computer Science & Information Technology, 2011. 3(3): 74-82.
[3]R. Paradiso, "Wearable Health Care System for Vital Signs Monitoring", International IEEE EMBS Special Topic Conference on Information Technology Applications in Biomedicine, Prato, Italy, 24-26 April 2003. pp. 283-286.
[4]M. Kamel, "Real-Time GPS/GPRS Based Vehicle Tracking System", International Journal Of Engineering And Computer Science, 2015. 4(8): pp. 648-652.
[5]K. Salim and I. Idrees, "Design and Implementation of Web-Based GPS-GPRS Vehicle Tracking System", International Journal of Computer Science Engineering and Technology, 2013. 3(12): 439-442.
[6]R. Gupta and B. Reddy, "GPS and GPRS Based Cost Effective Human Tracking System Using Mobile Phones", Viewpoint, 2011. 2(1): 39-45.
[7]N. Chadil, A. Russameesawang and P. Keeratiwintakorn, "Real-Time Tracking Management System Using GPS, GPRS and Google Earth", Electrical Engineering/ Electronics, Computer, Telecommunications and Information Technology, ECTI-CON 2008, 5th International Conference, 2008. pp. 393-396.
[8]C. Xenakis, D. Apostolopoulou, A. Panou and I. Stavrakakis, "A qualitative risk analysis for the GPRS technology", IEEE/IFIP 2008 International Conference Embedded and Ubiquitous Computing, EUC'08, 2008. pp. 61-68.
[9]S. Porcarelli, F. Di Giandomenico, A. Bondavalli, M. Barbera and I. Mura, "Service-Level Availability Estimation of GPRS Mobile Computing", IEEE Transactions, 2003. 2(3): 233-247.
[10]L. Siwik and L. Mozgowoj, "Server-Side Encrypting and Digital Signature Platform with Biometric Authorization", I. J. Computer Network and Information Security, 2015. 4: pp.1-13.
[11]R. Anderson, A. Poon, C. Lustig, W. Brunette, G. Borriello and B. Kolko, "Building a Transportation Information System Using only GPS and Basic SMS Infrastructure", Information and Communication Technologies and Development, 2009. pp. 233-242.
[12]M. Mouly and M. Pautet, "The GSM System for Mobile Communications", Telecom Publishing, France, 1992.
[13]A. Santis, A. Castiglione and U. Petrillo, "An Extensible Framework for Efficient Secure SMS", International Conference on Complex, Intelligent and Software Intensive Systems, Poland, 2010. pp. 843-850.
[14]A. Hossain, S. Jahan, M. Hussain, M. Amin and S. Shahnewaz, "A proposal for enhancing the security system of short message service in GSM", Anti-counterfeiting, Security and Identification, 2008. pp. 235-240.
[15]Z. Igor, M. Dmitry, S. Andrey, K. Dmitry, T. Anastasia and Z. Alexander, "Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals", International Journal of Computer Network and Information Security, 2013. (5): pp. 1-8.
[16]M. Jain and A. Jain, "Financial Transaction Security Using Mobile SMS", International Journal of u- and e-Service, Science and Technology, 2015. (8): pp. 365-374.
[17]N. Croft and M. Olivier, "Using an approximated one-time pad to secure short messaging service (SMS)", Proceedings of the southern African telecommunication networks and applications conference , 2005. pp. 71-76.
[18]J. Sempere, "An Overview of the GSM System", IEEE Vehicular Technology Society, 1997. pp.1-33.
[19]B. Omijeh and G. Ighalo, "Modeling of GSM-Based Energy Recharge Scheme for Prepaid Meter", IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), 2013. 4(1): pp. 46-53.
[20]Ch. Baath and J. Kuhn, "SMS over GPRS", Course report, Department of Microelectronics and Information Technology (IMIT), Royal Institute of Technology (KTH), Sweden, 2003.
[21]B. Ghribi and L. Logrippo, "Understanding GPRS: The GSM Packet Radio Service", Computer Networks, 2000. 34: pp. 763-779.
[22]L. Novak and M. Svensson, "MMS- Building on the success of SMS", Ericsson Rev, 2001. 78(3): pp. 102-109.
[23]F. Hillebrand, F. Trosby, K. Holley and I. Harris, "Short Message Service (SMS), the Creation of Personal Global Text Messaging", John Wiley and Sons Publication, 2010.