5 CONCLUSIONS
The growth of mobile technology has opened various
opportunities, both in marketing and in M-Commerce
applications; technologies such as cell phone net-
works are becoming integrated with other systems
such as the Internet. The SMS have been very pop-
ular among mobile phone users because it is silent,
fast, and cheap. Unfortunately, this may lead to new
security risks, for example when conducting phish-
ing attacks using mobile technology and especially
the SMS.
In this paper we proposed a framework to exchange
secure SMS with respect to: (a) security, communi-
cation between principals are based on well crypto-
graphic techniques, (b) traceability, transaction are
not kept anonymous, (c) usability and convenience,
cost of deployment and management for all subsys-
tems involved (consumer, service suppliers, trusted
service provider) are acceptable.
Furthermore, in order to set Trusted-SMS into a spe-
cific e-healthcare scenario, we made a prototype de-
veloped with open source tool. Since current trends
in mobile phone technology move towards a direc-
tion of miniaturization and higher computational and
graphical performance, allowing a complete transac-
tion procedure in less than a minute, we believe that
Trusted-SMS prototype can shows the validity of our
framework in the field.
Finally, the case study covers only one of the possible
uses of Trusted-SMS framework. The systems man-
aging private information, or systems that schedule
a booking/reservation procedure (e.g. system that can
be used by theatre, stadium cinemas, airline company,
university), or involving money transfers, can benefit
of security features provided by Trusted-SMS frame-
work.
REFERENCES
3GPP (2007). 3rd generation partnership project.
AreaSX (2007). Sms machine/htpp.
Barbi, L. (2007). Spidersms - sending and reception of en-
crypted sms.
Bouncycastle (2007). The legion of the bouncycastle.
Center, C. C. R. (2007). Sms spoofing - q-a with ccrc staff.
Chirico, U. (2007). Miabo - messages in a bottle.
CryptoSMS (2007). Cryptosms - protecting your confiden-
tial sms messages.
Dickinger, A., Haghirian, P., Murphy, J., and Scharl, A.
(2004). An investigation and conceptual model of
sms marketing. In System Sciences, Proceedings of
the 37th Annual Hawaii International Conference on.
F.I.P.S. (2002). Secure hash standard, fips publication.
F.I.P.S. (2007). Federal information processing standards.
FortressSMS (2007). Fortresssms - phone based application
to send and read encrypted sms text messages.
Higgins, J. Z. L. and Clement, M. (2001). Performance of
finite field arithmetic in an elliptic curve cryptosys-
tem. Security Technology, CCST ’05. 39th Annual
2005 International Carnahan Conference on, pages
249 – 256.
Jonson, D., Menezes, A., and Vanstone, S. (2001). The
elliptic curve digital signature algorithm.
Kivimaki, A. and Fomin, V. (2001). What makes a killer
application for the cellular telephony services? Stan-
dardization and Innovation in Information Technol-
ogy, 2nd IEEE Conference, pages 25 – 37.
Kryptex (2007). Kryptex - send and receive encrypted text
sms.
Lai, K. Y., Phan, T. K. A., and Tari, Z. (2005). Efficient
soap binding for mobile web services. Local Com-
puter Networks 30th Anniversary, The IEEE Confer-
ence on, pages 218 – 225.
Levy, E. and Arce, I. (2004). Interface illusions. In IEEE
Security and Privacy, pages 66 – 99.
Martinez, V. G., Avila, C. S., Garcia, J. E., and Encinas,
L. H. (2005). Elliptic curve cryptography: Java im-
plementation issues. Local Computer Networks 30th
Anniversary, The IEEE Conference on, pages 238 –
241.
MultiTasker (2007). Multitasker - messaging made easy.
of Standard et Technology, N. I. (2007). Digital signature
standard.
van der Merwe, A., Seker, R., and Gerber, A. (2005). Phish-
ing in the system of systems settings: mobile technol-
ogy. In Systems, Man and Cybernetics, IEEE Interna-
tional Conference on, pages 228 – 232.
Waadt, A., Bruck, G., Jung, P., Kowalzik, M., Trapp, T., and
Begall, C. (2005). Qos monitoring for professional
short-message-services in mobile networks. Wireless
Communication Systems, 2nd International Sympo-
sium on, pages 228 – 232.
Zoratti, I. (2006). Mysql security best practices. Crime and
Security, The Institution of Engineering and Technol-
ogy Conference on, pages 183 – 198.
HEALTHINF 2008 - International Conference on Health Informatics
50