The full text of this article

 

End-to-end security mechanisms for SMS
by Jing-Shyang Hwu, Shih-Feng Hsu, Yi-Bing Lin, Rong-Jaye Chen
International Journal of Security and Networks (IJSN), Vol. 1, No. 3/4, 2006

 

Abstract: In the mobile communication systems, security (encryption) offered by the network operator applies only on the wireless link. Data delivered through the mobile core network may not be protected. Existing end-to-end security mechanisms are provided at application level and typically based on public key cryptosystem. This paper introduces two encryption mechanisms based on the Rivest-Shamir-Adleman (RSA) scheme and the Identity-based (ID-based) scheme to provide end-to-end security for Short Message Service (SMS). We implement these two mechanisms over the standard SMS network architecture and estimate the encryption overhead. Our study indicates that the ID-based mechanism has advantages over the RSA mechanism in key distribution and scalability of increasing security level for mobile service.

Online publication date: Thu, 21-Dec-2006

 

is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

 
Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

 
Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:

 

    Username:        Password:         

Forgotten your password?


 
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

 
If you still need assistance, please email subs@inderscience.com