Sayed Javad Mousavi, Kamal Chaharsooghi, Gholam Ali Montazer
{"title":"短消息服务协议综述","authors":"Sayed Javad Mousavi, Kamal Chaharsooghi, Gholam Ali Montazer","doi":"10.5377/nexo.v35i04.15543","DOIUrl":null,"url":null,"abstract":"There are many ways to send and receive an electronic message, but SMS is more popular and nowadays used for one time password (OTP) as a part of authentication in many web applications, internet of things (IoT) access, password reset, mobile banking (M-banking), etc. Therefore, we must know how the protocol works and about its security. This protocol is designed to manage federatively (i.e., the mobile network is managing partially by many independent operators and it doesn’t need to have a central operator for the whole network. Also, many independent centrally managed networks can connect together to make a bigger network). We reviewed SMS protocol and its network structure, message structure, network entities, entities’ connection, and some security-related issues. Finally, this protocol is evaluated if it can provide Identification, Authentication, Integrity, Nonrepudiation, Confidentiality, and Availability.","PeriodicalId":335817,"journal":{"name":"Nexo Revista Científica","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A review of short message service protocol\",\"authors\":\"Sayed Javad Mousavi, Kamal Chaharsooghi, Gholam Ali Montazer\",\"doi\":\"10.5377/nexo.v35i04.15543\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There are many ways to send and receive an electronic message, but SMS is more popular and nowadays used for one time password (OTP) as a part of authentication in many web applications, internet of things (IoT) access, password reset, mobile banking (M-banking), etc. Therefore, we must know how the protocol works and about its security. This protocol is designed to manage federatively (i.e., the mobile network is managing partially by many independent operators and it doesn’t need to have a central operator for the whole network. Also, many independent centrally managed networks can connect together to make a bigger network). We reviewed SMS protocol and its network structure, message structure, network entities, entities’ connection, and some security-related issues. Finally, this protocol is evaluated if it can provide Identification, Authentication, Integrity, Nonrepudiation, Confidentiality, and Availability.\",\"PeriodicalId\":335817,\"journal\":{\"name\":\"Nexo Revista Científica\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Nexo Revista Científica\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5377/nexo.v35i04.15543\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Nexo Revista Científica","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5377/nexo.v35i04.15543","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
There are many ways to send and receive an electronic message, but SMS is more popular and nowadays used for one time password (OTP) as a part of authentication in many web applications, internet of things (IoT) access, password reset, mobile banking (M-banking), etc. Therefore, we must know how the protocol works and about its security. This protocol is designed to manage federatively (i.e., the mobile network is managing partially by many independent operators and it doesn’t need to have a central operator for the whole network. Also, many independent centrally managed networks can connect together to make a bigger network). We reviewed SMS protocol and its network structure, message structure, network entities, entities’ connection, and some security-related issues. Finally, this protocol is evaluated if it can provide Identification, Authentication, Integrity, Nonrepudiation, Confidentiality, and Availability.