Open Access Open Access  Restricted Access Subscription or Fee Access

End to End Security for Mobile Application

G. Murali, C. Adi Pavan Kumar Redddy, G.V.N. Swetha, P. Bharath Kumar


Today many transactions and information exchange
are being carried out using mobile devices and mobile networks. This leads to transfer of real or perceived value in exchange for information, services, or goods. Security is an essential and important factor for various transactions Sensitive data from a mobile application needs to be delivered to the server carefully without being disclosing the data to other parties. In this paper, an end-to-end
application-layer security solution for mobile devices using the Java 2 Platform Micro Edition (J2ME) is proposed. The proposed solution uses pure Java components to provide end-to-end client authentication and data confidentiality between wirelesses clients (mobile devices) and servers. Rijndael is used for encryption and SHA1 is used for calculating the message digest. This solution can be implemented with limited resources of a mobile device. There is no need of modifying the underlying protocols or wireless network infrastructure. . We develop a mobile application to check our solution. The mobile application connects to the server and exchanges data with the server. The data sent to the server is encrypted using a key and the server having the same key uses it for decrypting the data and getting the original data. In this paper, we provide a solution for mobile client authentication with the server and confidentiality of data. The mobile application can be run on a Java
compatible phone with GPRS facility, so that it can connect to the server.


J2ME, Rijndael, SHA1, MIDP1,Authentication,wireless system communication

Full Text:



Wassim Itani and Ayman Kayssi, “J2me application-layer end-to-end

security for m-commerce”, Journal of Network and Computer

Applications, Vol. 27, No. 1, January 2004, pp.13–32.Germano

Caronniy, Marcel Waldvogelz, Dan Sunz , Bernhard Plattnerz,

“Efficient Security for Large and Dynamic Multicast Groups”, pp.1-3.

Sameer Hasan Al-bakri and M. L. Mat Kiah, “A novel peer-to-peer SMS

security solution using a hybrid technique of NTRU and AES-Rijndael”,

Scientific Research and Essays Vol. 5(22), November 2010, pp. 3455-

V.Vijayaraghavan, R.S.D.Wahida Banu, “Efficient key

Management Architecture with Copyright Protection for Dynamic

Groups”, JATIT, 2007, pp.60-64.

Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed

M Mahfouz, “Hybrid Compression Encryption Technique for Securing SMS”, International Journal of Computer Science and Security (IJCSS),

Volume 3 Issue 6,pp.473-481.Guevara Noubir, “A Scalable Key-

Distribution Scheme for Dynamic Multicast Groups”, pp.1-8.

Ashlesha Mahawadiwar and Dr. N.G Bawane, “A software framework

for authentication of interacting data between different mobile

applications”, International journal of advanced engineering sciences

and technologies Vol. 4, No. 1, pp.10 – 14.

S.Britto Ramesh Kumar and S.Albert Rabara. “MPCS: Secure Accountbased

Mobile Payment System”, International Journal of Information

Processing and Management, Volume 1, No. 1, July 2010.

Abhinav Kumar, David Akopian, Sos Agaian, Reiner Creutzburg, “A

Secure Wireless Mobile-to-Server Link”, Proc. of SPIE-IS&T Electronic

Imaging, SPIE Vol. 7256, 725602

Hann-Jang Ho and RongJou Yang , “A Comparison of Secure

Mechanisms for Mobile Commerce”, Proceedings of the 7th WSEAS

International Conference on Mathematics & Computers in Business &

Economics, Cavtat, Croatia, June 13-15, 2006,pp.24-28.

Zhong Wan, Weifeng Yin, Ronggao Sun, “Design and Implementation

Mobile Payment Based on Multi-Interface of Mobile Terminal”,

WSEAS transactions on computers, Vol. 8, January 2009, pp.93-102.

Fadi Aloul, Syed Zahidi, Wasim El-Hajj, “Multi Factor Authentication

Using Mobile Phones”, International Journal of Mathematics and

Computer Science, Vol.4, No. 2, pp.65–80.

Serdar S. Erdem, Aysel Uyar, Mustafa Toyran “Use of Rijndael Block

Cipher on J2ME Devices for Encryption and Hashing.”

Anna Isakow and Hao Shi, “Review of J2ME and J2ME-based Mobile

Applications”, IJCSNS International Journal of Computer Science and

Network Security, VOL.8, No.2, February 2008, pp.189-198.

J. Daemen, V. Rijmen, “AES Proposal: Rijndael" 1999.

The bouncy castle lightweight API.

Prithwi Raj Chakraborty,Alok Kumar Chowdhury,Sujan

Chowdhury,Farhana Shirin Chowdhury, “ An Efficient Approach to

Access Database in J2ME Applications”, Int. J. Comp. Tech. Appl., Vol

, pp.374-378.

James Keogh, “J2ME: The Complete Reference.” McgrawHill/Osborne


Kim Topley, “J2ME in a Nutshell.”


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.