Self-Destructing Messages Using Layered Encryption for Mobile Devices
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 4
Abstract
Communication through SMS is very popular now-a-days and it is cheap, fast and simple. However, when confidential information is exchanged using SMS, it is very difficult to protect the information from SMS security threats like man-in-middle attack and eavesdropping. Most of the times, these threats are difficult to detect and therefore increasing the security of SMS communication is the only way to avoid such threats. Earlier messaging security was generally provided through single encryption mechanism but this mechanism is not sufficient to encrypt a file (i.e. audio, video, text and image). Also, there were no systems that would double encrypt a file in a single system in SMS communication. We propose self-destructing messages using layered encryption, an enhanced messaging architecture equipped with self-destructing feature and double encryption of a file in a mobile environment. Senders will be able to set location and time constraints for their messages. The constraints will determine where and when the sent messages are decrypted. The paper presents a design for Android platform application and is equipped with three modes for sending the messages, namely- Insecure, Secure and Ultra Secure.
Authors and Affiliations
Shraddha Badade, Rasika Borate, Sayali Dhobale, Pooja Ghogare
Trembling Based First Aid Device for Heart attack
According to the world health organization census 92% of heart attack death occurs during the time of bringing the heart victims to the hospital. So far there is no other handheld first aid device existing for heart att...
Nodules Detection Based on Morphological Operation
The paper presents the lung nodules detection based on morphological operation. Lung Cancer is one of the most dangerous diseases in medical diagnosis. Lung Computer-Aided Diagnosis (CAD) is a potential method to detect...
A Review on Vampire Attacks in ad hoc Wireless Networks
A new class of resource consumption attacks is Vampire Attacks. Such attacks use different routing protocols to disable the ad hoc wireless networks by depleting the battery power of the node. Devices in ad hoc wireless...
Regulating-Speed PFC Bridgeless Buck–Boost Converter-Fed BLDC Motor Drive With Fuzzy Controller
This paper proposes a power factor corrected (PFC) to converter- fed brushless direct current (BLDC) motor drive. A PFCBL buck–boost converter is designed to work in discontinuous inductor current mode (DICM) to offer a...
Excess Thermodynamic Properties and Molecular Interaction in Ternary Systems of Aniline at 303.15K
Densities and viscosities of ternary liquid mixtures of Aniline with two polar solvents viz. Methyl ethyl ketone and N, N-Dimethylformamide and three non-polar solvents viz. benzene, toluene and carbon tetra chloride as...