Financial Transaction Security Using Mobile SMS: Tata Consultancy Services Bangalore Tech Mahindra, Bangalore
Financial Transaction Security Using Mobile SMS: Tata Consultancy Services Bangalore Tech Mahindra, Bangalore
1. Introduction
The point-to-point SMS provides a mechanism for transmitting "short" messages to and
from wireless handsets. This service makes use of a short message service center (SMSC)
which acts as a store and forward system for short messages. The wireless network provides
transport of short messages between the SMSCs and wireless handsets. In compare to existing
text message transmission services (such as alphanumeric paging), the service elements are
aimed to provide guaranteed delivery of text messages to the endpoint [1, 2, 3].
A differentiating characteristic of the service is that a vigorous mobile handset is able to
receive or submit a short message at any time, self-governing of whether or a voice or data
call is in progress. SMS also guarantees delivery of the short message by the network.
Temporary failures are identified, and the short message is stored in the network until the
target becomes available [3, 4].
SMS is considered by out-of-band packet delivery and low-bandwidth message transfer.
Initial applications of SMS focused on excluding alphanumeric pagers by permitting two way
general purpose messaging and notification services, primarily for voice mail. As networks
technology matured, a diversity of services were introduced like electronic mail and fax
integration, paging integration, interactive banking, and information services such as stock
quotes. Wireless data applications include downloading of SIM cards for activation, debit,
and profile editing purposes. Now days, SMS is playing vital role in banking, advertisement
sector and validation Purpose. In this paper, we are consider, the application SMS to control
fraud applying security mechanism.
366
a specific mobile station, that the mobile station is now recognized by the mobile network to
be accessible.
2.5 Mobile Switching Center: The mobile switching center (MSC) performs the switching
functions of the system and controls calls to and from other telephone and data systems.
2.6 Visitor Location Register: The visitor location register (VLR) is a database that
contains temporary information about subscribers. This information is needed by the MSC in
order to service visiting subscribers.
2.7 The Base Station System: All radio-related functions are performed in the base station
system (BSS). The BSS consists of base station controllers (BSCs) and the base transceiver
stations (BTSs) and its primary responsibility is to transmit voice and data traffic between the
mobile stations.
2.8 The Mobile Station: The mobile station (MS) is the wireless terminal capable of
receiving and originating short messages as well as voice calls. The wireless network
signaling infrastructure is based on Signaling System No 7 (SS7). SMS makes use of the
mobile application part (MAP) which defines the methods and mechanisms of
communication in wireless networks, and uses the services of the SS7 transaction capabilities
application part (TCAP). An SMS service layer makes use of the MAP signaling capabilities
and enables the transfer of short messages between the peer entities.
3. Signaling Elements
The mobile application part (MAP) layer defines the operations necessary to support the
short message service. Both American and international standards bodies have defined a
MAP layer using the services of the signaling system No. 7 transaction capabilities part. The
American standard is published by Telecommunication Industry Association and is referred
to as IS-41. The international standard is defined by the European Telecommunication
Standards Institute and is referred to as GSM MAP. The following basic MAP operations are
necessary to provide the end-to-end short message service:
Routing information request: Before attempting short message delivery, the SMSC
needs to retrieve routing information in order to determine the serving MSC for the mobile
station at the time of the delivery attempt. This is accomplished by way of an interrogation of
the HLR which is accomplished via the use of the SMS request and send Routing Info for
Short Message mechanisms in IS41 and GSM respectively.
Point-to-point short message delivery: The mechanism provides a means for the
SMSC to transfer a short message to the MSC which is serving the addressed mobile station
and attempts to deliver a message to an MS whenever the MS is registered, even when the
MS is engaged in a voice or data call. The short message delivery operation provides a
confirmed delivery service. The operation works in tandem with the base station subsystem
while the message is being forwarded from the MSC to the MS. Therefore, the outcome of the
comprises either success (i.e., delivery to the mobile) or failure caused by one of several
possible reasons. The point-to-point short message delivery is accomplished via the use of the
Short Message Delivery-Point-to-Point (SMD-PP) and forward Short Message mechanisms in
IS-41 and GSM respectively.
367
Short message waiting indication: The operation is activated when a short message
delivery attempt by the SMSC fails due to a temporary failure and provides a means for the
SMSC to request the HLR to add an SMSC address to the list of SMSCs to be informed when
the indicated mobile station becomes accessible. This short message waiting indication is
realized via the use of the SMS notification indicator and set message waiting data
mechanisms in IS41 and GSM respectively.
Service center alert: The operation provides a means for the HLR to inform the SMSC
which has previously initiated unsuccessful short message delivery attempts to a specific
mobile station, that the mobile station is now recognized by the mobile network to be
accessible. This service center alert is accomplished via the use of the SMS notification and
alert service mechanisms in IS41 and GSM respectively. In GSM networks, the type of
messaging service is identified by the protocol identifier information element which identifies
the higher level protocol or interworking being used. Examples are telex, group 3 telefax,
X.400 messaging, ERMES, and voice telephone. In IS41 networks, the service type is
distinguished by use of the teleservice identifier. Basic teleservices include the following:
II.
368
III.
IV.
369
5. Implementation
Unprotected communication channels pose serious security vulnerabilities. Thus, it is
importantly pertinent that both the mobile applications and the service provider must apply
some reliable protective techniques to avoid these assailable vulnerabilities [6, 7]. To avoid
security vulnerabilities, the authentication of account we can divided by two part- Public key,
private key and code for enable/disable.
Public key user will generate by account holder and register with the bank and account
holder will get private key from bank. Public key and private key can we generate by using
any of key generating tool. But message send to server in encrypted format and server will
decrypt and process based on request. In this process, server first do authentication of user
based on public key and private key after that process the request.
370
6. Conclusion
Purchase fraud occurs when a criminal approaches a merchant and proposes a business
transaction, and then uses fraudulent means to pay for it, such as a stolen or fake credit card.
As a result, merchants do not get paid for the sale. Merchants who accept credit cards may
receive a chargeback for the transaction and lose money as a result.
The use of Internet services or software with Internet access to defraud wounded or to
otherwise take advantage of them, for example by pocketing personal information, which can
even lead to identity shoplifting. A very common form of Internet fraud is the distribution of
scoundrel security software. Internet services can be used to present fraudulent solicitations to
potential victims to conduct deceitful transactions, or to transmit the proceeds of fraud to
financial institutions or to others connected with the scheme. In this paper, we have discussed
about application SMS to protect your account to defraud victims.
371
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Abomhara M, Khalifa O, Zakaria O, Zaidan A, Zaidan B, Alanazi H (2010). Suitability of Using Symmetric
Key to Secure Multimedia Data: An Overview. J. Appl. Sci., 10: 1656-1661.
Aziz Q (2006). Payments through Mobile Phone. Emerging Technologies, 2006. ICET '06. International
Conference on. pp. 50-52.
Beller MJ, Chang LF, Yacobi Y (1993). Privacy and authentication on a portable communications system.
IEEE J. Selected Areas Commun., 11: 821-829.
Hassinen M (2005). SafeSMS-End-to-End encryption for SMS messages. pp. 359-365.
Hwu JS, Chen RJ, Lin YB (2006). An efficient identity-based cryptosystem for end-to-end mobile security.
IEEE Trans Wireless Commun., 5: 2586.
Jumaat NB, Zakaria O, Gani A (2008). GSM Mobile SMS/MMS using Public Key Infrastructure: MPKI.
WSEAS Trans. Comput., 7: 1219-1229.
Zheng Y (1996). An authentication and security protocol for mobile computing. pp. 249-257.
Acronyms
AC Authentication Center
AIN Advanced Intelligent Networks
BSC Base Station Controllers
BSS Base Station System
BTS Base Transceiver Station
CDMA Code Division Multiple Access
CMT Cellular Messaging Teleservice
CPT Cellular Paging Teleservice
GMSC Gateway Mobile Switching Center
GSM Global Standard for Mobiles
HLR Home Location Register
MAP Mobile Application Part
MIN Mobile Identification Number
MO-SM Mobile-Originated Short Message
MS Mobile Station
MSC Mobile Switching Center
MT-SM Mobile-Terminated Short Message
SM Short Message
SMD-PP Short Message Delivery Point-to-Point
SME Short Message Entity
SMS Short Message Service
SMSC Short Message Service Center
SMS-GMSC Gateway Mobile Switching Center
SMS-IWMSC SMS Interworking Mobile Switching Center
SMTP Simple Mail Transfer Protocol
SS7 Signaling System 7
TAP Telocator Alphanumeric Protocol
TCAP Transaction Capabilities Application Part
TDMA Time Division Multiple Access
TDP Telocator Data Protocol
TNPP Telocator Network Paging Protocol
VLR Visitor Location Register
VMN Voice Mail Notification
372
Author
Dr. Manoj kumar jain is Solution Architect in Computer Science at
Tata Consultancy Services, Bangalore, India, His current research
interests include Fuzzy Logic, Genetic Algorithm, Big Data, Data Mining,
Software Engineering.
Anjana Jain is Software Quality auditor in Tech Mahindra, Bangalore,
India. Her research interest include Quality and Analytics.
373
374