Main Article Content
A Secured Framework for Short Messages Service in Global System for Mobile Communication
Abstract
Short Message Service (SMS) has upgraded and elevated our lives and is principal in our livelihood. This service has been driven by the Global System for Mobile Communications (GSM) which is the most popular standard for mobile telephony systems. As a result, the GSM has constituted the moderate execution of short message service (SMS), which has uplifted mobile phone quality. A proper understanding of the essentials of SMS/MMS security opens the door to prevent some common security. which has fostered the prevention of some common threats in SMS usage. Unfortunately, the SMS does not has any built-in vetting procedure to authenticate the text or provide security for the data/text, and supportive phone facilities are designed without considering the SMS/MMS security aspects. There is also a problem of mobile applications developer and the mobile service providers not knowing the correct identities of the communicating parties, and also the problem of little to no SMS/MMS content confidentiality and integrity during data transmission. This paper is aimed at addressing these problems by focusing on the use of substitution techniques of audio steganography. We achieve our method by having a low robustness against attacks which try to reveal the hidden message. This allows only SMS that is encrypted, and application to multimedia messages needs to be further investigated. Furthermore, encryption is done using substitution cipher methods. We also analyze the security mechanism based on the mobile security requirements and mobile performance capability. Analysis of the security mechanism based on the mobile security requirements and mobile performance capability is carried out. After an exhaustive computer simulation, the performance of the proposed method is confirmed. The result obtained showed that compression ratio achieved is within the range of 0.1 and 0.5, the best achieved so far. In this study, color pictures were utilized as main pictures, but grey color pictures can be investigated in the comparable way. Our study encompasses a supplementary safeguard encryption method alongside an alternative rotation method and a reconstruction key. Supplementary convoluted rotation manner makes it harder for unauthorized people to reconstruct pictures lacking the appropriate keys.