Mobile User Communication Over Wireless Network Based on Crypto-Random Method

نویسندگان

  • B Bala Abirami
  • N Valli
چکیده

Mobile communication is a process of sending data, messages, files or speaking over a mobile network. Mobile user (Mu) communicates with other user through Short Message Service (SMS) also. Formal as well as informal information can also send by SMS. Highly secured, confidential SMS messages are transmitted as plaintext between Mobile User and the SMS Center (SMSC), using wireless network. SMS contents are stored in the systems of network operators and can be read by their personnel. Since, the SMS is sent as plaintext, therefore network operators will simply access the content of SMS during the transmission at SMSC. In this paper, a new method called Crypto-Random method is proposed inorder to avoid such hacking. It uses cryptographic techniques on the confidential messages and the intermediate unauthenticated users cannot reveal the original confidential information. INTRODUCTION Nowadays the most excellent way to send any information in mobile network is through SMS, because of its fast, robust and uninterrupted nature; but at the same time, it is highly insecure. There is a chance for the SMS content to be read by the mobile operators which is send by the mobile users. The conventional communication service does not provide any type of safety issues to the SMS. Various applications such as health care monitoring [3], finance, banking and military services send their highly secured confidential information through SMS. In all these applications SMS plays a major role because the user can get their SMS anywhere in the world. According to a new report, mobile phone penetration will rise from 61.1% to 69.4% of the global population between 2013 and 2017 [10]. SMS contents are subjected to various attacks such as SMS disclosure, OTA modification, Man-In-The-Middle (MITM) attack, Masquerade, play back attack. The mobile users can send their private, commercial, confidential information through SMS. Bank transactions such as One Time Password (OTP), Pin Number send by banks or organizations via SMS messages for authorizing or confirming high-risk on-line transactions leads to loss, modification of message content by the hackers. This is the research problem in mobile communication to transmit SMS across the network. There are some protection issues related the open functionality of SMS, because the messages are transmitted as a plain text among the sender and receiver across the network. There is a chance for the intruders or hackers to read the confidential message. In this paper Crypto-Random model is proposed. It uses an efficient encryption and decryption method for SMS communication using AES cryptographic algorithm. The process of transforming plain text of SMS to cipher format SMS for data security is also proposed. After forming cipher text of the secure SMS, it is encoded with a random key. Android mobile phone is used to implement this method, which is used to transmit the confidential messages. This paper comprises of the following sections. Introduction is given in first section. The second section gives the proposed system model, next it deals with advantages of the proposed system. The last section concludes the paper with future work. CASE STUDY SYSTEM ARCHITECTURE This section case study deals with the system architecture of the Crypto-Random method. This comprises of three components Mobile user1 (sender), Mobile user2 (Receiver) and the Authentication server. The design model narrates how the user creates the secret message and the process of forwarding and authenticating. It comprises of two sides (1) Sender side Architecture (2) Receiver side Architecture. It is clearly shown in Figure (1) and Figure (2) Figure.1: Sender side Architecture The above figure illustrates the Sender side Architecture. In Registration phase, the Mobile user1 send a request signal to connect to the Authentication server. The Authentication server validates the user profile and adds detail about the user in its database. After that it sends a conformation request to the sender. Then the sender sends a confidential message to the receiver through the Authentication server. It performs encryption to the confidential message using AES.The AES uses 192 bit keys for encryption. Then it generates a random key and it is accumulated with the cipher format SMS. Now it is ready to send to the receiver. Figure.2: Receiver side Architecture Figure 2 illustrates the Receiver side Architecture. In Receiver side, the receiver must also perform registration with the Authentication server. The mobile user2 who is the receiver sends a request to connect to the crypto-Random protocol. The Au-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Investigation and Performance Analysis of ZigBee Technology using OPNET

Abstract- Communication has become inevitably part of our day to day activities, in academic, business, banking, and other sectors. It has therefore become so important to implement good and efficient communication system. A reference point according to this research is the wireless sensor networking (WSN) system, and most important thing in communication is to be free from interference, attenu...

متن کامل

Quasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks

Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...

متن کامل

A new SDN-based framework for wireless local area networks

Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAcc...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

Wireless sensor network design through genetic algorithm

In this paper, we study WSN design, as a multi-objective optimization problem using GA technique. We study the effects of GA parameters including population size, selection and crossover method and mutation probability on the design. Choosing suitable parameters is a trade-off between different network criteria and characteristics. Type of deployment, effect of network size, radio communication...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015