{"title":"Extraction and Verification of Mobile Message Integrity","authors":"R. Verma, D. Tomar, S. Rathore","doi":"10.1109/CSNT.2011.17","DOIUrl":null,"url":null,"abstract":"Crime investigation in mobile phone is an important source of data acquisition. Offenders tamper Mobile phone technology is increasing rapidly. Now companies are expanding their horizon through mobile message services, making it essential. On other hand tight physical and border security may encourage criminals to use mobile SMS to communicate suspicious data. Message contents to effect message integrity. In this work common mobile phone attacks, SMS encoding and decoding techniques are presented. A prototype system is also implemented to verify the message integrity.","PeriodicalId":294850,"journal":{"name":"2011 International Conference on Communication Systems and Network Technologies","volume":"85 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Communication Systems and Network Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT.2011.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
Crime investigation in mobile phone is an important source of data acquisition. Offenders tamper Mobile phone technology is increasing rapidly. Now companies are expanding their horizon through mobile message services, making it essential. On other hand tight physical and border security may encourage criminals to use mobile SMS to communicate suspicious data. Message contents to effect message integrity. In this work common mobile phone attacks, SMS encoding and decoding techniques are presented. A prototype system is also implemented to verify the message integrity.