

End to End Security for Mobile Application
Abstract
Today many transactions and information exchange
are being carried out using mobile devices and mobile networks. This leads to transfer of real or perceived value in exchange for information, services, or goods. Security is an essential and important factor for various transactions Sensitive data from a mobile application needs to be delivered to the server carefully without being disclosing the data to other parties. In this paper, an end-to-end
application-layer security solution for mobile devices using the Java 2 Platform Micro Edition (J2ME) is proposed. The proposed solution uses pure Java components to provide end-to-end client authentication and data confidentiality between wirelesses clients (mobile devices) and servers. Rijndael is used for encryption and SHA1 is used for calculating the message digest. This solution can be implemented with limited resources of a mobile device. There is no need of modifying the underlying protocols or wireless network infrastructure. . We develop a mobile application to check our solution. The mobile application connects to the server and exchanges data with the server. The data sent to the server is encrypted using a key and the server having the same key uses it for decrypting the data and getting the original data. In this paper, we provide a solution for mobile client authentication with the server and confidentiality of data. The mobile application can be run on a Java
compatible phone with GPRS facility, so that it can connect to the server.
Keywords
References
Wassim Itani and Ayman Kayssi, “J2me application-layer end-to-end
security for m-commerce”, Journal of Network and Computer
Applications, Vol. 27, No. 1, January 2004, pp.13–32.Germano
Caronniy, Marcel Waldvogelz, Dan Sunz , Bernhard Plattnerz,
“Efficient Security for Large and Dynamic Multicast Groups”, pp.1-3.
Sameer Hasan Al-bakri and M. L. Mat Kiah, “A novel peer-to-peer SMS
security solution using a hybrid technique of NTRU and AES-Rijndael”,
Scientific Research and Essays Vol. 5(22), November 2010, pp. 3455-
V.Vijayaraghavan, R.S.D.Wahida Banu, “Efficient key
Management Architecture with Copyright Protection for Dynamic
Groups”, JATIT, 2007, pp.60-64.
Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed
M Mahfouz, “Hybrid Compression Encryption Technique for Securing SMS”, International Journal of Computer Science and Security (IJCSS),
Volume 3 Issue 6,pp.473-481.Guevara Noubir, “A Scalable Key-
Distribution Scheme for Dynamic Multicast Groups”, pp.1-8.
Ashlesha Mahawadiwar and Dr. N.G Bawane, “A software framework
for authentication of interacting data between different mobile
applications”, International journal of advanced engineering sciences
and technologies Vol. 4, No. 1, pp.10 – 14.
S.Britto Ramesh Kumar and S.Albert Rabara. “MPCS: Secure Accountbased
Mobile Payment System”, International Journal of Information
Processing and Management, Volume 1, No. 1, July 2010.
Abhinav Kumar, David Akopian, Sos Agaian, Reiner Creutzburg, “A
Secure Wireless Mobile-to-Server Link”, Proc. of SPIE-IS&T Electronic
Imaging, SPIE Vol. 7256, 725602
Hann-Jang Ho and RongJou Yang , “A Comparison of Secure
Mechanisms for Mobile Commerce”, Proceedings of the 7th WSEAS
International Conference on Mathematics & Computers in Business &
Economics, Cavtat, Croatia, June 13-15, 2006,pp.24-28.
Zhong Wan, Weifeng Yin, Ronggao Sun, “Design and Implementation
Mobile Payment Based on Multi-Interface of Mobile Terminal”,
WSEAS transactions on computers, Vol. 8, January 2009, pp.93-102.
Fadi Aloul, Syed Zahidi, Wasim El-Hajj, “Multi Factor Authentication
Using Mobile Phones”, International Journal of Mathematics and
Computer Science, Vol.4, No. 2, pp.65–80.
Serdar S. Erdem, Aysel Uyar, Mustafa Toyran “Use of Rijndael Block
Cipher on J2ME Devices for Encryption and Hashing.”
Anna Isakow and Hao Shi, “Review of J2ME and J2ME-based Mobile
Applications”, IJCSNS International Journal of Computer Science and
Network Security, VOL.8, No.2, February 2008, pp.189-198.
J. Daemen, V. Rijmen, “AES Proposal: Rijndael" 1999.
The bouncy castle lightweight API.
Prithwi Raj Chakraborty,Alok Kumar Chowdhury,Sujan
Chowdhury,Farhana Shirin Chowdhury, “ An Efficient Approach to
Access Database in J2ME Applications”, Int. J. Comp. Tech. Appl., Vol
, pp.374-378.
James Keogh, “J2ME: The Complete Reference.” McgrawHill/Osborne
publication.
Kim Topley, “J2ME in a Nutshell.”
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.