Self-Destructing Messages Using Layered Encryption for Mobile Devices

Abstract

Communication through SMS is very popular now-a-days and it is cheap, fast and simple. However, when confidential information is exchanged using SMS, it is very difficult to protect the information from SMS security threats like man-in-middle attack and eavesdropping. Most of the times, these threats are difficult to detect and therefore increasing the security of SMS communication is the only way to avoid such threats. Earlier messaging security was generally provided through single encryption mechanism but this mechanism is not sufficient to encrypt a file (i.e. audio, video, text and image). Also, there were no systems that would double encrypt a file in a single system in SMS communication. We propose self-destructing messages using layered encryption, an enhanced messaging architecture equipped with self-destructing feature and double encryption of a file in a mobile environment. Senders will be able to set location and time constraints for their messages. The constraints will determine where and when the sent messages are decrypted. The paper presents a design for Android platform application and is equipped with three modes for sending the messages, namely- Insecure, Secure and Ultra Secure.

Authors and Affiliations

Shraddha Badade, Rasika Borate, Sayali Dhobale, Pooja Ghogare

Keywords

Related Articles

Trembling Based First Aid Device for Heart attack

According to the world health organization census 92% of heart attack death occurs during the time of bringing the heart victims to the hospital. So far there is no other handheld first aid device existing for heart att...

Nodules Detection Based on Morphological Operation

The paper presents the lung nodules detection based on morphological operation. Lung Cancer is one of the most dangerous diseases in medical diagnosis. Lung Computer-Aided Diagnosis (CAD) is a potential method to detect...

A Review on Vampire Attacks in ad hoc Wireless Networks

A new class of resource consumption attacks is Vampire Attacks. Such attacks use different routing protocols to disable the ad hoc wireless networks by depleting the battery power of the node. Devices in ad hoc wireless...

Regulating-Speed PFC Bridgeless Buck–Boost Converter-Fed BLDC Motor Drive With Fuzzy Controller

This paper proposes a power factor corrected (PFC) to converter- fed brushless direct current (BLDC) motor drive. A PFCBL buck–boost converter is designed to work in discontinuous inductor current mode (DICM) to offer a...

Excess Thermodynamic Properties and Molecular Interaction in Ternary Systems of Aniline at 303.15K

Densities and viscosities of ternary liquid mixtures of Aniline with two polar solvents viz. Methyl ethyl ketone and N, N-Dimethylformamide and three non-polar solvents viz. benzene, toluene and carbon tetra chloride as...

Download PDF file
  • EP ID EP20256
  • DOI -
  • Views 229
  • Downloads 3

How To Cite

Shraddha Badade, Rasika Borate, Sayali Dhobale, Pooja Ghogare (2015). Self-Destructing Messages Using Layered Encryption for Mobile Devices. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(4), -. https://europub.co.uk/articles/-A-20256