Mobile Communication: SMS Security Review (Issues, Attacks and Preventive Measures)
Hammonnds, M. B. 2003. Spam – the meat of the problem. “Computer Law & Security Report “vol 19, issue 5, 388 – 391.
Brown, I., Cajee , Z., Davies, D., AND Stroebel, S. 2003.” Cell phone banking: predictors of adoption in South Africa – an exploratory study”. International Journal of Information Management, volume 23, issue 5, 381 – 394.
Lord, S. 2003. “Trouble at Telco: When GSM Goes Bad”. Network Security, issue 1, 10 – 12.
Zhang F, Yang HW, Song C (2005). “A security scheme of SMS system.” pp. 1333.
Hossain M, Jahan A, Hussain S, Amin MM, Newaz MR, Shah SH (2008). “A proposal for enhancing the security system of short message service in GSM”. pp. 235-240.
Croft NJ, Olivier MS. “Using an approximated one-time pad to secure short messaging service (SMS)”. In: Proceedings of African telecommunication networks and applications conference (SATNAC); 2005. p. 71–6.
G. Le Bodic, "Mobile Messaging Technologies and Services SMS, EMS” and MMS", 2nd ed. John Wiley & Sons Ltd, (2005).
Steve Lord,” X-Force Security Assessment Services, and Internet: Trouble at the Telco When GSM goes bad”. In Network Security, 2003(1):10 12, 2003
A. Biryukov, A. Shamir, D. Wagner, “Real Time Cryptanalysis of A5/1 on a PC”, 2000 http://cryptome.org/a51-bsw.htm. Accessed on: 13February 2007.
SMS Forum, “Short Message Peer-to-Peer Protocol Specification version” 5.0, http://www.smsforum.net.)
Wagner, D. “GSM Cloning”. Smartcard Developer Association and ISAAC security research group http://www.isaac.cs.berkeley.edu/isaac/gsm.html (1998); accessed 28 October 2006.
N.J Croft, M.S Olivier “A Silent SMS Denial of Service (DoS) Attack” Information and Computer Security Architectures (ICSA) Research Group South Africa
Sun Microsystems. J2ME devices [Online]. Available from: http://developers.sun.com/techtopics/mobility/device/device; 2005a[accessed 14.11.05].
Thomas Eisenbarth, Sandeep Kumar, Christof Paar and Axel Poschmann, Leif Uhsadel, A Survey of Lightweight-CryptographyImplementations, IEEE Design & Test of Computers, November- December 2007
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.