메뉴 건너뛰기




Volumn 6, Issue 6, 2011, Pages 1147-1165

Review of mobile short message service security issues and techniques towards the solution

Author keywords

Mobile communication; Mobile public key infrastructure; Short message service cryptography; Short message service security; Short message service security analysis

Indexed keywords


EID: 79957657234     PISSN: None     EISSN: 19922248     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (34)

References (85)
  • 2
    • 78650590292 scopus 로고    scopus 로고
    • A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
    • Al-bakri S, Kiah M (2010). A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael. Sci. Res. Essays., 5: 3455-3466.
    • (2010) Sci. Res. Essays , vol.5 , pp. 3455-3466
    • Al-Bakri, S.1    Kiah, M.2
  • 4
    • 78049468900 scopus 로고    scopus 로고
    • Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance
    • Alanazi H, Jalab H, Alam G, Zaidan B, Zaidan A (2010). Securing electronic medical records transmissions over unsecured communications: An overview for better medical governance. J. Med. Plants Res., 4: 2059-2074.
    • (2010) J. Med. Plants Res , vol.4 , pp. 2059-2074
    • Alanazi, H.1    Jalab, H.2    Alam, G.3    Zaidan, B.4    Zaidan, A.5
  • 5
    • 79957461639 scopus 로고    scopus 로고
    • Secure topology for electronic medical record transmissions
    • Alanizi H, Kiah M, Zaidan A, Alam G (2010). Secure topology for electronic medical record transmissions. Int. J. Pharmacol., 6: 954-958.
    • (2010) Int. J. Pharmacol , vol.6 , pp. 954-958
    • Alanizi, H.1    Kiah, M.2    Zaidan, A.3    Alam, G.4
  • 8
    • 79957650659 scopus 로고    scopus 로고
    • Case TELKOM FLEXI
    • Asvial M, Sirat D, Susatyo B (2008). Design and Analysis of Anti Spamming SMS to Prevent Criminal Deception and Billing Froud: Case TELKOM FLEXI.
    • (2008) Susatyo B
    • Asvial, M.1    Sirat, D.2
  • 9
    • 46149101202 scopus 로고    scopus 로고
    • Payments through Mobile Phone. Emerging Technologies
    • Aziz Q (2006). Payments through Mobile Phone. Emerging Technologies, 2006. ICET '06. International Conference on. pp. 50-52.
    • (2006) ICET '06. International Conference On , pp. 50-52
    • Aziz, Q.1
  • 11
    • 0027641891 scopus 로고
    • Privacy and authentication on a portable communications system
    • Beller MJ, Chang LF, Yacobi Y (1993). Privacy and authentication on a portable communications system. IEEE J. Selected Areas Commun., 11: 821-829.
    • (1993) IEEE J. Selected Areas Commun , vol.11 , pp. 821-829
    • Beller, M.J.1    Chang, L.F.2    Yacobi, Y.3
  • 12
    • 79957667968 scopus 로고    scopus 로고
    • Real Time Cryptanalysis of A5/1 on a PC
    • Biryukov A, Shamir A, Wagner D (2001). Real Time Cryptanalysis of A5/1 on a PC. pp. 37-44.
    • (2001) , pp. 37-44
    • Biryukov, A.1    Shamir, A.2    Wagner, D.3
  • 15
    • 33746248681 scopus 로고    scopus 로고
    • Design and implementation of a PKIbased end-to-end secure infrastructure for mobile E-Commerce
    • Chanson ST, Cheung TW (2001). Design and implementation of a PKIbased end-to-end secure infrastructure for mobile E-Commerce. World Wide Web. 4: 235-253.
    • (2001) World Wide Web , vol.4 , pp. 235-253
    • Chanson, S.T.1    Cheung, T.W.2
  • 23
    • 67650066992 scopus 로고    scopus 로고
    • A State of Security for SMS on Mobile Devices, Electronics, Robotics and Automotive Mechanics Conference
    • Garza-Saldana JJ, Daz-Pérez A (2008). A State of Security for SMS on Mobile Devices, Electronics, Robotics and Automotive Mechanics Conference, CERMA '08. 4(5):110-115.
    • (2008) CERMA '08 , vol.4 , Issue.5 , pp. 110-115
    • Garza-Saldana, J.J.1    Daz-Pérez, A.2
  • 24
    • 0031165261 scopus 로고    scopus 로고
    • Use of SS7 in D-AMPS-based PCS: Orthodoxy vs. heterodoxy
    • Glitho RH (1997). Use of SS7 in D-AMPS-based PCS: orthodoxy vs. heterodoxy. Personal Commun. IEEE., 4: 15-23.
    • (1997) Personal Commun. IEEE , vol.4 , pp. 15-23
    • Glitho, R.H.1
  • 28
    • 1342302574 scopus 로고    scopus 로고
    • Simplifying public key management
    • Gutmann P (2004). Simplifying public key management. Comput., 37: 101-103.
    • (2004) Comput , vol.37 , pp. 101-103
    • Gutmann, P.1
  • 36
    • 33748598990 scopus 로고    scopus 로고
    • An efficient identity-based cryptosystem for end-to-end mobile security
    • Hwu JS, Chen RJ, Lin YB (2006). An efficient identity-based cryptosystem for end-to-end mobile security. IEEE Trans Wireless Commun., 5: 2586.
    • (2006) IEEE Trans Wireless Commun , vol.5 , pp. 2586
    • Hwu, J.S.1    Chen, R.J.2    Lin, Y.B.3
  • 38
    • 76549088474 scopus 로고    scopus 로고
    • Developing and implementing encryption algorithm for addressing GSM security issues.Emerging Technologies
    • Islam S, Ajmal F (2009). Developing and implementing encryption algorithm for addressing GSM security issues.Emerging Technologies, 2009. ICET 2009. International Conference. pp. 358-361.
    • (2009) ICET 2009. International Conference , pp. 358-361
    • Islam, S.1    Ajmal, F.2
  • 39
    • 80052788393 scopus 로고    scopus 로고
    • Usability and privacy in identity management architectures
    • Jøsang A, Zomai MA, Suriadi S (2007). Usability and privacy in identity management architectures. p. 152.
    • (2007) , pp. 152
    • Jøsang, A.1    Zomai, M.A.2    Suriadi, S.3
  • 40
    • 59249085781 scopus 로고    scopus 로고
    • GSM Mobile SMS/MMS using Public Key Infrastructure: M-PKI
    • Jumaat NB, Zakaria O, Gani A (2008). GSM Mobile SMS/MMS using Public Key Infrastructure: M-PKI. WSEAS Trans. Comput., 7: 1219-1229.
    • (2008) WSEAS Trans. Comput. , vol.7 , pp. 1219-1229
    • Jumaat, N.B.1    Zakaria, O.2    Gani, A.3
  • 42
    • 0037710621 scopus 로고    scopus 로고
    • Study of Management on the Mobile Public Key Infrastructure
    • Kawamoto K, Nakamura N (2002). Study of Management on the Mobile Public Key Infrastructure. NOMS2002, Apr, pp. 955-957.
    • (2002) NOMS2002, Apr , pp. 955-957
    • Kawamoto, K.1    Nakamura, N.2
  • 43
    • 0242527195 scopus 로고    scopus 로고
    • Security aspects of 3G-WLAN interworking
    • Koien GM, Haslestad T (2003). Security aspects of 3G-WLAN interworking. Commun. Mag. IEEE, 41: 82-88.
    • (2003) Commun. Mag. IEEE , vol.41 , pp. 82-88
    • Koien, G.M.1    Haslestad, T.2
  • 46
    • 0141569860 scopus 로고    scopus 로고
    • Lightweight security for mobile commerce transactions
    • Lam KY, Chung SL, Gu M, Sun JG (2003). Lightweight security for mobile commerce transactions. Comput. Commun., 26: 2052-2060.
    • (2003) Comput. Commun , vol.26 , pp. 2052-2060
    • Lam, K.Y.1    Chung, S.L.2    Gu, M.3    Sun, J.G.4
  • 48
    • 33846630288 scopus 로고    scopus 로고
    • Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce
    • Lee Y, Lee J, Song JS (2007). Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce. Comput. Commun., 30: 893-903.
    • (2007) Comput. Commun , vol.30 , pp. 893-903
    • Lee, Y.1    Lee, J.2    Song, J.S.3
  • 52
    • 53049088300 scopus 로고    scopus 로고
    • SMSSec: An end-to-end protocol for secure SMS
    • Lo JLC, Bishop J, Eloff JHP (2008). SMSSec: an end-to-end protocol for secure SMS. Comput. Security, 27: 154-167.
    • (2008) Comput. Security , vol.27 , pp. 154-167
    • Lo, J.L.C.1    Bishop, J.2    Eloff, J.H.P.3
  • 58
    • 11244336964 scopus 로고    scopus 로고
    • On the impact of GSM encryption and manin-the-middle attacks on the security of interoperating GSM/UMTS networks. Personal, Indoor and Mobile Radio Communications
    • Meyer U, Wetzel S (2004b). On the impact of GSM encryption and manin-the-middle attacks on the security of interoperating GSM/UMTS networks. Personal, Indoor and Mobile Radio Communications, 2004. PIMRC 2004. 15th IEEE Int. Symposium on. 4: 2876-2883.
    • (2004) PIMRC 2004. 15th IEEE Int. Symposium On , vol.4 , pp. 2876-2883
    • Meyer, U.1    Wetzel, S.2
  • 60
    • 13444263534 scopus 로고    scopus 로고
    • The value of mobile applications: A utility company study
    • Nah FFH, Siau K, Sheng H (2005). The value of mobile applications: a utility company study. Commun. ACM, 48:90.
    • (2005) Commun. ACM , vol.48 , pp. 90
    • Nah, F.F.H.1    Siau, K.2    Sheng, H.3
  • 62
    • 33745926210 scopus 로고    scopus 로고
    • Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment
    • Nicholson A, Smith I, Hughes J, Noble B (2006). Lokey: Leveraging the sms network in decentralized, end-to-end trust establishment. Pervasive Computing. pp. 202-219.
    • (2006) Pervasive Computing , pp. 202-219
    • Nicholson, A.1    Smith, I.2    Hughes, J.3    Noble, B.4
  • 63
    • 0010385996 scopus 로고    scopus 로고
    • Helsinki University of technology, Lauri. Pesonen@ iki. Fi
    • Pesonen L (1999). Gsm interception. lecture notes, Helsinki University of technology, Lauri. Pesonen@ iki. Fi, pp. 1-9.
    • (1999) Gsm Interception. Lecture Notes , pp. 1-9
    • Pesonen, L.1
  • 67
    • 16444376120 scopus 로고    scopus 로고
    • Two-factor authentication: Too little, too late
    • Schneier B. (2005). Two-factor authentication: too little, too late. Communications of the ACM. 48: 136.
    • (2005) Communications of the ACM , vol.48 , pp. 136
    • Schneier, B.1
  • 69
    • 79957638731 scopus 로고    scopus 로고
    • Analysis of payment transaction security in mobile commerce.Information Reuse and Integration, 2004
    • IRI 2004
    • Seema N, Lu CT, Liang LR (2004). Analysis of payment transaction security in mobile commerce.Information Reuse and Integration, 2004. IRI 2004. Proceedings of the 2004 IEEE Int. Conf. pp. 475-480.
    • (2004) Proceedings of the 2004 IEEE Int. Conf , pp. 475-480
    • Seema, N.1    Lu, C.T.2    Liang, L.R.3
  • 72
    • 79952053382 scopus 로고    scopus 로고
    • Mobile SMS Banking Security Using Elliptic Curve Cryptosystem
    • Soram R (2009). Mobile SMS Banking Security Using Elliptic Curve Cryptosystem. IJCSNS. 9: 30.
    • (2009) IJCSNS , vol.9 , pp. 30
    • Soram, R.1
  • 76
    • 63249087404 scopus 로고    scopus 로고
    • Solutions to the GSM Security Weaknesses.Next Generation Mobile Applications, Services and Technologies, 2008
    • Toorani M, Beheshti SAA (2008). Solutions to the GSM Security Weaknesses.Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST '08. The Second International Conference on. pp. 576-581.
    • (2008) NGMAST '08. the Second International Conference On , pp. 576-581
    • Toorani, M.1    Beheshti, S.A.A.2
  • 77
    • 62949166612 scopus 로고    scopus 로고
    • LPKI-a Lightweight Public Key Infrastructure for the mobile environment, 162-166
    • Toorani M, Shirazi B, Asghar A (2008). LPKI-a Lightweight Public Key Infrastructure for the mobile environments. pp. 162-166.
    • (2008)
    • Toorani, M.1    Shirazi, B.2    Asghar, A.3
  • 78
    • 79957654316 scopus 로고    scopus 로고
    • Xml security based access control for healthcare information in mobile environmen
    • Weerasinghe D, Elmufti K, Rajarajan M, Rakocevic V (2006). Xml security based access control for healthcare information in mobile environment. pp. 1-6.
    • (2006) , pp. 1-6
    • Weerasinghe, D.1    Elmufti, K.2    Rajarajan, M.3    Rakocevic, V.4
  • 79
    • 0026852968 scopus 로고
    • Signaling System No.7, IS-41 and cellular telephony networking
    • Wilson DR (1992). Signaling System No.7, IS-41 and cellular telephony networking. Proceed. IEEE, 80: 644-652.
    • (1992) Proceed. IEEE , vol.80 , pp. 644-652
    • Wilson, D.R.1
  • 80
    • 79957634515 scopus 로고    scopus 로고
    • The importance of PKI today
    • Wilson S (2005). The importance of PKI today. China Communications. p. 15.
    • (2005) China Communications , pp. 15
    • Wilson, S.1
  • 82
    • 79957646860 scopus 로고    scopus 로고
    • Eighth International Conference on Embedded Computing
    • Research on NTRU Algorithm for Mobile Java Security.Scalable Computing and Communications
    • Xiaoyu S, Zhenjun D, Rong C (2009). Research on NTRU Algorithm for Mobile Java Security.Scalable Computing and Communications; Eighth International Conference on Embedded Computing, 2009. SCALCOM-EMBEDDEDCOM'09. Int. Conf. pp. 366-369.
    • (2009) SCALCOM-EMBEDDEDCOM'09. Int. Conf , pp. 366-369
    • Xiaoyu, S.1    Zhenjun, D.2    Rong, C.3
  • 84
    • 79957664504 scopus 로고    scopus 로고
    • Building Secure User-to-user Messaging in Mobile Telecommunication Networks
    • Zhao S, Aggarwal A, Liu S (2008). Building Secure User-to-user Messaging in Mobile Telecommunication Networks. pp. 24-26.
    • (2008) , pp. 24-26
    • Zhao, S.1    Aggarwal, A.2    Liu, S.3
  • 85
    • 79957662659 scopus 로고    scopus 로고
    • An authentication and security protocol for mobile computing
    • Zheng Y (1996). An authentication and security protocol for mobile computing. pp. 249-257.
    • (1996) , pp. 249-257
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.