Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Wireless and Mobile Network Architectures
Wireless and Mobile Network Architectures
Guide to Elliptic Curve Cryptography
Guide to Elliptic Curve Cryptography
Wireless and Mobile All-IP Networks
Wireless and Mobile All-IP Networks
A statistic approach for deriving the short message transmission delay distributions
IEEE Transactions on Wireless Communications
An efficient identity-based cryptosystem for end-to-end mobile security
IEEE Transactions on Wireless Communications
The effect of leaders on the consistency of group behaviour
International Journal of Sensor Networks
Security and Communication Networks
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
Electronic payment scheme using identity-based cryptography
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Secure SMS based automatic device pairing approach for mobile phones
ICIC'13 Proceedings of the 9th international conference on Intelligent Computing Theories and Technology
Hi-index | 0.01 |
In the mobile communication systems, security (encryption) offered by the network operator applies only on the wireless link. Data delivered through the mobile core network may not be protected. Existing end-to-end security mechanisms are provided at application level and typically based on public key cryptosystem. This paper introduces two encryption mechanisms based on the Rivest-Shamir-Adleman (RSA) scheme and the Identity-based (ID-based) scheme to provide end-to-end security for Short Message Service (SMS). We implement these two mechanisms over the standard SMS network architecture and estimate the encryption overhead. Our study indicates that the ID-based mechanism has advantages over the RSA mechanism in key distribution and scalability of increasing security level for mobile service.