Self-Destructing Messages Using Layered Encryption for Mobile Devices
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Communication through SMS is very popular now-a-days and it is cheap, fast and simple. However, when confidential information is exchanged using SMS, it is very difficult to protect the information from SMS security threats like man-in-middle attack and eavesdropping. Most of the times, these threats are difficult to detect and therefore increasing the security of SMS communication is the only way to avoid such threats. Earlier messaging security was generally provided through single encryption mechanism but this mechanism is not sufficient to encrypt a file (i.e. audio, video, text and image). Also, there were no systems that would double encrypt a file in a single system in SMS communication. We propose self-destructing messages using layered encryption, an enhanced messaging architecture equipped with self-destructing feature and double encryption of a file in a mobile environment. Senders will be able to set location and time constraints for their messages. The constraints will determine where and when the sent messages are decrypted. The paper presents a design for Android platform application and is equipped with three modes for sending the messages, namely- Insecure, Secure and Ultra Secure.
Authors and Affiliations
Shraddha Badade, Rasika Borate, Sayali Dhobale, Pooja Ghogare
Study on Classification of Differential System in Automobile
This paper is introducing only classification of differential system. This paper is show on open differential system, locked differential system, limited slip differential system, electronic traction control. A differen...
Information Seeking Behavior of Students in Theem College of Engineering Boisar: A Survey
Information needs and information seeking behaviour are important aspects in information science. This study states the comparative study of information seeking behaviour of students in Theem college of Engineering Bois...
Area efficient DA based Fir filter for EEG Classification
Due to the recent development of digital signal processing algorithms and very large-scale integrated circuit technologies, the initial implementation obstacles of the orthogonal frequency division multiplexing (OFDM) n...
Mobility Management in Cellular Network Based On Cognitive Radio
Cognitive radio is emerging wireless technology which offers reallocation and reutilization of the unused spectrum. Not all the network runs with highest load at all the time. Therefore part of spectrum always remains u...
Cluster Based Routing Protocol for Channel Allocation in Heterogeneous Manet
Energy and bandwidth efficiency is most important in the MANET network. By using the coordinated protocol with infrastructure there is a lack in the channel allocation dynamically. A dynamic channel allocation method is...