ate another person or company. This way, an attacker
may trigger SMS based procedures on behalf of the
user. The issue becomes critical if the procedure does
not use any confirmation TAN, for example if the user
initially triggers the procedure via SMS and the re-
maining part is processed on the server side (includ-
ing the generation of the signature).
6 FUTURE WORK AND
CONCLUSIONS
The conducted security analysis revealed several se-
curity issues that have to be considered in future work.
Also, the use of SMS messages to transmit potentially
security sensitive data raises the question on the gen-
eral security of SMS technology. The weakness of the
encryption schemes used by the GSM protocol has al-
ready been shown (Barkan et al., 2008). Hence, data
transmissions over GSM networks cannot always be
regarded as secure.
The need for a secure exchange of SMS messages
has already been addressed by various authors. A
comprehensive overview of current approaches to en-
hance the security of SMS is given in (Medani et al.,
2011). For instance, Lisonek and Drahansk (Lisonek
and Drahansk, 2008) enhanced the security of SMS
messages by using asymmetric cryptography. An-
other method relying on both symmetric and asym-
metric encryption schemes has been proposed by An-
uar et al. (Anuar et al., 2008). Another solution fol-
lowing a hybrid cryptographic scheme has been intro-
duced in (Al-bakri and Kiah, 2010). All these meth-
ods are basically able to enhance the security of data
being exchanged via SMS. However, all these solu-
tions also add a certain amount of complexity and re-
quire the incorporation of additional components. For
our prototypical implementation we have therefore
omitted all security enhancing features. The evalu-
ation of existing approaches and their integration into
our solution to enhance its security is regarded as fu-
ture work.
In this paper we have presented an SMS based ap-
plication that makes use of advanced as well as qual-
ified electronic signatures to meet security require-
ments of transactional m-Government services. Our
application allows users to dynamically create, elec-
tronically sign, and deliver PDF documents on a pure
SMS basis. Tests have shown that our solution allows
documents to be created, singed, and deliverd within
a few seconds.
Although being fully functional, the presented ap-
plication is still in a prototypical state. The basic goal
of this prototypical implementation was to evaluate
whether an integration of electronic signatures into
SMS based services is technically feasible. Definitely,
our application shows that this is basically possible.
REFERENCES
Al-bakri, S. and Kiah, M. (2010). A novel peer-to-peer
sms security solution using a hybrid technique of
ntru and aes-rijndael. Scientific Research and Essays,
5(22):3455–3466.
Anuar, N. B., Kuen, L. N., Zakaria, O., Gani, A., and Wa-
hab, A. W. A. (2008). Gsm mobile sms/mms using
public key infrastructure: m-pki. W. Trans. on Comp.,
7:1219–1229.
Barkan, E., Biham, E., and Keller, N. (2008). Instant
Ciphertext-Only Cryptanalysis of GSM Encrypted
Communication. J. Cryptol., 21:392–429.
EGov-Labs (2012). PDF-AS. http://egovlabs.gv.at/projects/
pdf-as/.
European Union (1999). Directive 1999/93/ec of the eu-
ropean parliament and of the council of 13 december
1999 on a community framework for electronic signa-
tures.
Leitold, H., Hollosi, A., and Posch, R. (2002). Security ar-
chitecture of the austrian citizen card concept. In Pro-
ceedings of the 18th Annual Computer Security Ap-
plications Conference (ACSAC ’02). IEEE Computer
Society.
Lisonek, D. and Drahansk, M. (2008). Sms encryption for
mobile communication. International Conference on
Security Technology, pages 198–201.
MBAONLINE (2011). Planet text - how
sms messaging is changing the world.
http://www.mbaonline.com/planet-text/.
Medani, A., Gani, A., Zakaria, O., Zaidan, A. A., and
Zaidan, B. B. (2011). Review of mobile short message
service security issues and techniques towards the so-
lution. Scientific Research and Essays, 6(6):1147–
1165.
Mobi Solutions Ltd (2010). Mobile government: 2010 and
beyond.
Orthacker, C., Centner, M., and Kittl, C. (2010). Qualified
mobile server signature. In Proceedings of the 25th
TC 11 International Information Security Conference.
Posch, K.-C., Posch, R., Tauber, A., Zefferer, T., and Zwat-
tendorfer, B. (2011). Secure and provacy-preserving
egovernment - best practice austria. In Rainbow of
Computer Science. Springer.
Zefferer, T. (2011). Mobile government - e-government for
mobile societies.
WEBIST2012-8thInternationalConferenceonWebInformationSystemsandTechnologies
752