scholarly journals A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification

2018 ◽  
Vol 2018 ◽  
pp. 1-21 ◽  
Author(s):  
Chalee Thammarat ◽  
Werasak Kurutach

Information security and fair exchange are essential to creating trust among all the parties participating in any sale transaction. However, implementing them in any mobile commerce is challenging due to the limitation of resources on mobile devices. Numerous m-commerce protocols that have been proposed so far still lack those two important aspects. In this paper, we propose mobile payment (m-payment) protocols, a crucial part of m-commerce, that incorporate both information security and fair exchange while retaining their own lightweight property. To allow convenience of use, the proposed protocols can be implemented on the existing Short Message Service (SMS) infrastructure. Our approach is based on the secure session key generation technique to enhance information security under lightweight conditions and involves a trusted third party to guarantee fair exchange without information disclosure. We have formally proven that our protocols are more effective and efficient than others in terms of fairness, security, and lightweight properties. In addition, the soundness and completeness of the protocols have been analyzed and proven using BAN logic and an automated security protocol proof tool named Scyther.

2021 ◽  
pp. 31-38
Author(s):  
I Made Sunia Raharja ◽  
Ahmad Ashari

SMS banking still becomes a popular way to make transaction inquiry in Indonesia. The technology protocol used by the service provider is still not secure. The majority of local banks in Indonesia still use non-secure SMS protocols standard. Therefore, an SMS Banking protocol, providing information security service in the transactional message, is urgently in need. Information security can be achieved through some security mechanisms, i.e., encipherment, digital signature, data integrity, and key exchange. These mechanisms are applicable through the implementation of cryptography. SMS Banking security protocol in this research runs through two steps. The first step is the transmission of the transaction request, and the second step is the transaction process. The encipherment is conducted using 3DES symmetric cryptography. Digital signature and data integrity are conducted using ECDSA asymmetric cryptography. The key exchange is conducted using ECDH. The test result showed that the implementation of the protocol could conduct an SMS Banking service and provide protection over the PIN. In general, this protocol has fulfilled X.800 security services.


In cloud computing disseminated assets are shared by means of system in open condition. Subsequently client can without much of a stretch access their information from anyplace. Simultaneously exist protection and security problems because of numerous causes. Initial one is emotional improvement in system advances. Another is expanded interest for computing assets, which make numerous associations to reappropriate their information stockpiling. So there is a requirement for secure cloud stockpiling administration in open cloud condition where the supplier isn't a confided in one. Our research tends to various information security and protection assurance problems in a cloud computing condition and suggests a technique for giving diverse security administrations like validation, approval and classification alongside checking in postponement. 128 piece Advanced Cryptograph Standard (AES) is utilized to increment information security and classification. In this supported methodology information is encoded utilizing AES and afterward transferred on a cloud. The supported model uses Short Message Service (SMS) ready instrument with keeping away from unapproved access to client information.


Author(s):  
D. Lakshmi Renuka devi

Abstract: In cloud computing distributed assets are shared by means of system in exchange of matter with its environment. Subsequently client can expanse the access their information from anyplace. Simultaneously exist protection and security problems arise because of various causes. Initial one is poignant upgrade in system advances. Another is expanded interestfor future benefit accretion, which make numerous associations to re- appropriate their information hoard. So there is a demand for assured cloud stockpiling management in open cloud condition where the supplier isn't a divulge in one. Our research tends to various data security and protectionassurance problems in a cloud computing condition and suggests a approach for giving assorted security administrations like authentication, consent and classification alongside checking in adjournment 128 piece Advanced Cryptograph Standard (ACS) is utilized to increment information security and classification. Incloud, aided technical information is encoded & decoded engrossing ACS and eventual transmit on a cloud. The supported model uses Short Message Service (SMS) mechanism by keeping away from unapproved access to client information. Keywords: Network, Authorization, Confidentiality, Security, authorized searchable cryptograph


2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Although many ways to communicate with someone, SMS is still one of the popular media to send a message to someone. Not unlike the others, the messages sent can be known by the third party either tapping or the investigation. Unencrypted SMS can be easily obtained from communication providers so that they may be misused. Since the communication devices have been using Android operating system, they are programmable. There is various script can be inserted to devices to protect the data. One of them is Vernam Cipher. This method offers how to protect personal messages sent via SMS easily. It converts the message into an encrypted message shortly before sent. At the moment there tapping on the outside, the information is not easily understood its contents. The message is entirely secure.


2020 ◽  
Vol 32 (1) ◽  
Author(s):  
Benson Zenda ◽  
Ruthea Vorster ◽  
Adéle Da Veiga

South Africa enacted the Protection of Personal Information Act 4 of 2013 (POPI) in an effort to curb the misuse of customers’ personal information by organisations. The aim of this research was to establish whether the South African insurance industry is adhering to certain prescripts of POPI, focusing on direct marketing requirements. An experiment was utilised to monitor the flow of personal information submitted to 20 insurance companies requesting short-term insurance quotations, using new e-mail addresses and phone numbers. The results of the experiment indicate that 92% of the marketing communication received did not have prior consent from the researcher. Contact was made by companies outside the sample, indicating third-party sharing. 86% of the unsolicited short message service (SMS) communication received required customers to pay for unsubscribing from SMSs, which is not in line with regulatory requirements. The non-compliance evident in this experiment acts as an early warning to the insurance industry and South Africa, prompting a more concerted effort towards preparation of compliance with POPI. A personal information processing management framework is proposed to aid the insurance industry in understanding how personal information can be processed in line with the requirements of the Act.


Author(s):  
J. Sasi Bhanu ◽  
J. K. R. Sastry ◽  
T. Chandrasekhara Reddy

Users use Android-based applications for communicating through emailing, text messaging, and transmission of audio and video objects. The attackers manipulate the email, text, videos, or audio so that users' receipt of the messages causes malware through their handheld devices. A runtime routine is invoked, which causes damage to the local resources of the mobile phone. The manipulation of the messages is done using different signatures, making it difficult to recognize the same using a single approach. Multiple approaches are sometimes required to detect different signature-based incoming messages. Choosing a method that suits the signature of the incoming message is the key. Malware can also enter at the time of installing third-party apps, clicking on the links provided in the messages, installing and invoking the malware in the background. Many issues are involved in dealing with malware detecting, prevention, and curing. A comprehensive architecture is required to deal with every aspect of dealing malware. In this paper, a comprehensive architecture is presented that considers malware's issue, especially concerning malware affected through short message service (SMS) messages operated under the Android operating system. The disection of the SMS messages have been implemented and 99% accuracy has been achieved.


Author(s):  
Abolore Muhamin Logunleko ◽  
Kolawole Bariu Logunleko ◽  
Opeoluwa Olanrewaju Lawal ◽  
Onyinyechi Ogochukwu D Ezugwu ◽  
Olorunsesan Sunday Akinyemi

<em>There is always a need to transfer money from one user to another for either payment of services or settlement of business transactions and so on. Research has shown that traditional money transaction systems are prone to attacks through falsified deposit slips and drafts, theft of debit cards, forgery of signatures, use of false cheques and so on. Electronic money transaction is a payment performed from an electronic device which enables users to have access to their money anywhere and at any time with the aid of a network but not adequately secured. This application offers a platform independent of securing and transferring money using data masking and an enhanced base64 algorithm from one account to another. The study improves on existing money transfer and transaction systems by achieving a secured mobile money transaction system with masked and encrypted financial details both on the mobile application and also on the short message service application (Text Message Notification) sent to user’s platform which makes it difficult for third party to intercept and understand. </em>


Author(s):  
Albert Panjaitan ◽  
Hairul Amren ◽  
Darmeli Nasution ◽  
Rizaldy Khair ◽  
Iswandi Idris

Perkembangan yang sangat pesat terjadi pada bidang teknologi informasi dan telekomunikasi saat ini mendorong masyarakta dunia memasuki era revolusi industri 4.0 yang serba cepat, sekaligus menjadikan informasi sentral dalam dunia industri maupun dunia usaha hingga dunia pendidikan. Akademi Teknik dan Keselamatan Penerbangan (ATKP) Medan merupakan institusi pendidikan di bawah naungan pemerintah yang sudah mulai menggunakan berbagai hal teknologi informasi dan telekomunikasi. Dengan adanya perkembangan tersebut berdampak memeberikan fasilitas yang dapat digunakan oleh pengguna layanan komunikasi, dan informasi, seperti Short Message Service (SMS) hingga sistem berbasis aplikasi menggunakan smartphone android maupun iOS. Layanan aplikasi sms hingga sistem aplikasi tersebut adalah teknologi yang memungkinkan manusia untuk mendapatkan atau mengirimkankan informasi kapanpun dan dimanapun dibutuhkan. Penelitian ini bertujuan untuk membuat sistem aplikasi monitoring evaluasi pelaporan kegiatan taruna di ATKP medan berbasis web app. Dalam pembuatannya, aplikasi ini disesuaikan dengan kenutuhan user/orang tua taruna dan institusi ATKP secara umum. Sistem aplikasi ini akan memberikan kemudahan kepada orang tua taruna dalam memonitoring, kegiatan hingga prilaku taruna selama pendidikan di ATKP Medan serta  kemudahan mengakses nilai dengan cepat. Sistem aplikasi ini dibuat dengan menggunakan bahasa pemrograman php (web).


1970 ◽  
Vol 2 (3) ◽  
Author(s):  
Ermiati E ◽  
Imas Rafiyah ◽  
Devi Kusnanti

Anemia merupakan salah satu penyebab terjadinya perdarahan dan bisa mengakibatkan kematian pada ibu hamil. Suplementasi besi merupakan program pemerintah dalam mengatasi anemia pada wanita hamil dan beberapa wanita hamil masih ada yang belum patuh dalam mengkonsumsi tablet besi. Oleh karena itu, diperlukan sebuah metode yang bisa meningkatkan kepatuhan wanita hamil dalam mengonsumsi tablet besi yaitu dengan short message service (SMS) reminder. Penelitian ini bertujuan untuk mengidentifikasi efektivitas SMS reminderterhadap kepatuhan konsumsi tablet besi pada ibu hamil di (unit pelayanan terpadu) UPT Puskesmas Cibuntu Kota Bandung. Rancangan penelitian quasi experimentaldengan desain posttest-only with control group designdengan teknik pengambilan sampel yang digunakan adalah purposive sampling. Penelitian ini dilaksanakan dari bulan April–Mei tahun 2014 di Puskesmas X Kota Bandung. Sampel berjumlah 40 orang wanita hamil yang tidak patuh dalam mengonsumsi tablet besi yang dibagi menjadi 20 kelompok intervensi dan 20 kelompok kontrol. Data diperoleh melalui kuesioner dalam bentuk self report.Analisis data yang digunakan adalah analisis deskriptif dan uji chi square. Hasil penelitian menunjukkan sebagian besar kelompok intervensi 17 orang (85%) patuh dan sebagian besar kelompok kontrol 16 orang (80%) tidak patuh. Hasil analisis dengan menggunakan chi squaredidapatkan p(0.000) dengan taraf signifikan <0.05 sehingga dapat disimpulkan bahwa SMS reminder efektif terhadap kepatuhan konsumsi tablet besi pada wanita hamil dan bisa dijadikan bahan pertimbangan bagi pihak Puskesmas untuk menjalin kerjasama dengan pihak provideratau mengajukan dana ke Dinas Kesehatan untuk mengaktifkan SMS reminderdi Puskesmas.Kata kunci: Kepatuhan, SMS reminder,tablet besi, wanita hamil AbstractAnemia is one of the leading causes of hemorrhage during pregnancy, and it can cause death to expectant mothers. Iron supplementation is a government program to overcome anemia among expectant mothers, and some of the expectant mothers still do not obediently consume iron tablets. Therefore, to increase the obedience of the expectant mothers on consuming the iron tablets, SMS reminder is the appropriate method needed. This research aims to identify the effectiveness of SMS reminder to the obedience of iron tablets consumption among expectant mothers at UPT Puskesmas Cibuntu , Bandung. The research employed quasi-experimental design with posttest-only control group design using purposive sampling technique. The research was held on April–May 2014 at UPT Puskesmas Cibuntu, Bandung. Forty expectant mothers consuming iron tablets disobediently divided into 20 intervention groups and 20 control groups were taken as the samples. Questionnaire in form of self report was used to obtain data. In addition, descriptive analysis and chi square test were applied to analyze the data. The result of the research showed that 17 persons (85%) of intervention groups were mostly obedient, and 16 persons (80%) of control groups were mostly disobedient. From the analysis using chi square, it was found the difference of the obedience of iron tablets consumption after SMS reminder (p=0.00) had been delivered with significant level <0.05. Based on the result of this research, SMS reminder had an effective impact toward the obedience of iron tablets consumption among the expectant mothers. The result will be a good consideration for Puskesmas to cooperate with provider or proposed some funds to Dinas Kesehatan to activate SMS reminder.Key words:Expectant mothers, obedience, SMS reminder, iron tablets


2018 ◽  
Author(s):  
Rivalri Kristianto Hondro

Kemajuan perkembangan teknologi komputer dan telekomunikasi dapat membantu menyelesaikan pekerjaan dengan cepat, akurat dan efisien. Alat komunikasi yang banyak digunakan pada saat ini adalah mobile phone atau disebut juga telepon seluler. Salah satu teknologi yang digunakan untuk berkomunikasi pada mobile phone adalah dengan mengirimkan data berupa pesan singkat atau SMS (Short Message Service). Permasalahan yang ditemukan dalam berkomunikasi menggunakan mobile phone adalah pencurian, penyadapan, atau penghapusan data khususnya data SMS (Short Message Service) sehingga aspek keamanan data dianggap penting. Oleh karena itu dibutuhkan sistem kriptografi enkripsi dan dekripsi SMS, disini digunakan enkripsi simetris. Sistem ini merupakan aplikasi yang menerapkan metode zig zag cipher yang menggunakan kunci simtetris. Hasil pengujian dari sistem ini adalah pesan SMS dienkripsi dengan pola zig zag menggunakan kunci dan didekripsi menggunakan kunci yang sama dengan enkripsi.


Sign in / Sign up

Export Citation Format

Share Document