Friday, May 22, 2020

A New High for Society - 1887 Words

According to a recent study taken by the Gallup Poll, taken by the US government, states that 58 percent a clear majority are in favor of legalization of recreational marijuana; compared to the 39 percent that say no and the additional three percent who are unsure. Although the majority of American’s are in favor of recreational marijuana federal law challenges the optimism of Americans. In 48 states marijuana is classified as a â€Å"controlled substance† putting Americans at risk of a felony charge and permanently altering the life of an individual. By letting the voters choose, we can truly see the democracy America has to offer while creating a flourishing economy simply by opening up options the public wants. But at what cause? Legalization of recreational marijuana is linked to poor grades and various amount of health illnesses. Although it may be true that marijuana is linked to poor health the economics behind legalization is far more beneficial than most realiz e. Legislators need see what America wants and needs, and by majority that is marijuana. As marijuana becomes a more prominent debate topic America is slowly losing out on the chance of an economic upsurge. While accepting the risk of health issues recreational marijuana needs to be legalized to create jobs for economy, end the war on drugs, and create a safer environment for all America’s citizens. In the beginning America was founded off of the principle of opportunity and constituting a large number ofShow MoreRelatedCliques/Groups, Scapegoats, and Exclusion: the High Society of New York in the Age of Innocence1383 Words   |  6 PagesIn the current time, there are all kinds of groups/cliques. There are: the jocks, the nerds, and the goths in high school, and the upper class, the middle class, and the poor in society. Each of these groups has their own set of customs/rules that are followed. None of these rules are written. They are just understood. If an outsider comes to a clique and doesnt follow their rules, the group excludes them. If a member of a clique does something wrong, then the clique uses that person as aRead MoreSociety Wasn’t Built In a Day: Societal Structure in The Age of Innocence.1328 Words   |  5 Pagesof people’s lives in this very structured society. The numerous traditions and formalities in New York’s society alludes to how little breathing room the people have when it comes to keeping traditions. One of these traditions is the tradition that â€Å"every year on the fifteenth of October, Fifth Avenue opened its shutters, unrolled its carpets, and hung up its triple layer of window curtains. By the first of November this household ritual was over and society had begun to look about and take stock ofRead MoreCultural Differences Between Mncs And Hrm Essay1139 Words   |  5 Pagesin a society perceive the power to be distributed unequally. The high score of PD represents countries with the mor e organizational hierarchy and more power held by the people at the top levels of the hierarchy. Countries with a high Score of PD include India, China and South American countries. On the contrary, U.S can be one example of countries with low power distance (Hofstede, 2001). The second dimension is of Uncertainty Avoidance. It is the degree to which the individuals in a society are threatenedRead MoreThe Age of Innocence - Womens Struggle With Victorian Dogma 823 Words   |  4 Pages(1920) is not set after World War I. In fact, her work is set prior to it at the turn of the century. She describes Old New York from late 19th and early 20th century in great detail, â€Å"New York society and customs†¦are described with an accuracy that is almost uncanny: to read these pages is to live again.† She also looks at the upper class, instead of middle and lower class society with its dance halls of debauchery and improper solicitations. The threat of modernity after war and d epression are notRead More Is Canada a Post-Industrial Country? Essay861 Words   |  4 PagesThe term post-industrialism refers to a transition from one form of society to another; the original society being an industrial society, mainly dominated by forms of specialized physical labour, and the latter being a service and knowledge dominated format. An industrial society has many unique and definitive characteristics that separate it from a post-industrial one. Some of these characteristics include the heavy use of machinery in large factories; the use of fossil fuels to power the machinery;Read MoreWhat Are Your Plans For Next Year?1398 Words   |  6 Pagesyoung people are bombarded with on a daily basis. These type of questions are not just quick one worded answers with not much meaning that a high school students can think up quickly. These kind of questions require a lot of thinking and reflecting on the student because it is regarding the rest of their life and how it is going to be spent. In today’s society it is expected for students as young as 16 to know what university they want to go to, what subject to major in, and what kind of job they wantRead MoreImproving Low High School Reform916 Words   |  4 Pageslow-performing high schools become more student-centered, personalized, and intellectually rigorous t hrough the implementation of the Breaking Ranks Model of High School Reform. The model offers a capacity-building approach to school improvement based on the recommendations of Breaking Ranks: Changing an American Institution, which was produced by the National Association of Secondary School Principals (NASSP) in partnership with the Carnegie Foundation for the Advancement of Teaching. Data-Driven High SchoolRead MoreUnited Kingdom - Cultural Leadership Style1703 Words   |  7 Pagescultural dimensions. In each dimension whether it marked high or low can help a business determine how it should operate in that specific country. The first Hofstede dimension is the Power Distance Index. The Power Distance Index has to do with the inequality that not only is accepted but the inequality in existence between individuals of power and also to those without it. There will always be some kind of level of power in all societies and although some may be very unequal this measure simplyRead MoreEaster Island : Historical Analysis1308 Words   |  6 Pagestheories and conclusions about the beginning and end of the society. Easter Island’s environmentally enriched location created a question that historical analysis ponder: why did Easter Island Collapse? In order to have a failed society, there has to be a beginning. It is said that the first people to arrive on the island were the Polynesian, or Rapa Nui, in AD 400. The reason for people to walk this land is because they were in search of new kingdom to settle on or even to escape warfare. The RapaRead MoreThe Cultural Dimension Scores Provided By Geert Hofstede For The United States And Sweden967 Words   |  4 Pagesas the degree less powerful members of a society or workforce accept the inequalities in power (â€Å"Dimensions – Geert Hostede,† n.d.). The United States scores 40 compared to 31 for Sweden. Both countries scored fairly low in power distance suggesting equality is central desire. Lower ranking staff members in societies that exhibit small power ranking scores expect to be consulted (Hostede, 2011). Participative leaders could be very effective in this society as the defining qualities of this leadership

Friday, May 8, 2020

rebeldol Essay on Nora’s Rebellion in Ibsens A Dolls...

Nora’s Rebellion in A Doll’s House The central theme of A Doll’s House is Nora’s rebellion against society and everything that was expected of her. Nora shows this by breaking away from all the standards and expectations her husband and society had set up for her. In her time women weren’t supposed to be independent. They were to support their husbands, take care of the children, cook, clean, and make everything perfect around the house. Nora’s first rebellion was when she took out a loan so that she could pay for her husband, Torvalds medical treatment. It was against the law for women to take out a loan without their husbands consent. When she did this she proved that she wasn’t as submissive and helpless as Torvald†¦show more content†¦Torvald doesn’t trust her with any money and with the little money that he does entrust her with he is afraid that she will spend it on Macaroons, a candy that he has forbid her to eat. He calls her his little squirrel, skylark, and he says she spends money very foolishly. Nora’s second rebellion was when she left Torvald and her children. The society she lived in demanded that she should submit to her husband and that she should take a place under him. Society considered women to be property of their husbands and that they should fulfil their every command. When Krogstad tries to blackmail Nora, and Torvald didn’t even support her she realized that there was a problem. Then finally when Torvald realizes that his social stature will not be harmed he displays his real feeling for Nora, both physically and emotionally. It is at this time when Nora decides that she doesn’t want to be controlled by Torvald anymore and she told him that she was going to leave him. By leaving Torvald she is not only shutting him out but also forgetting everything in her past. When Torvald tries to reconcile with her she explains that all her life she was treated like a child. And how she was always merry, never happy, she never got to make any decisions on her own. Then she explains to him how she

Wednesday, May 6, 2020

Sms Banking Free Essays

Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. We will write a custom essay sample on Sms Banking or any similar topic only for you Order Now And Technology, Nagpur, India manoj_bramhe@yahoo. com Abstract— M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services. Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain text form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost. In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2]. Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, it is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability. Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking. Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objective is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into the GSM standard for support of transmitting information over the signalling channels of the GSM network. USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking. The consumer’s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumer’s mobile banking menu within the SIM card. STK is the most secure method of mobile banking. It allows the bank to load its own encryption keys onto the SIM card with the bank’s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily hacked by any hacker or seen by anyone from message inbox. Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired transaction. Device constraints raise the questions as to wh ether there will be adequate security for users without compromising the ease of use and speed. Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024 Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techniques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message Service Short Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM). Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks. An SMS Gateway allows interfacing software applications to send and/or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile. Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database. Bank sends Customer–side mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuously. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server. Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner. We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original senderâ€℠¢s address by altering respective field in original SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available. V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation. Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fields’s to accommodate for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fields’s as shown in above figure. Account Number: – It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: – It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted session keys stored in file, which will be stored on customer handset. ISSN : 0975-4024 Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: – This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: – Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS. MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS. After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset. Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message. Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer. Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number. If match is not found, it will send message â€Å"Wrong Account Number† to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message â€Å"Wrong Pin Number† to customer handset. Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side â€Å"Fake Transaction† and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset. VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server. Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm don’t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation property of encryption. Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed. This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance. This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system. The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB. Net server side application. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out. Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â€Å"Mobile banking Services in bank area†, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,†Spanish Mobile Banking Services: An Adoption Study†, Proceedings of the International Conference on Mobile Business 2005. Mohammad Shirali-Shahreza,†Improving Mobile Banking Security Using Steganography â€Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,†Mobile Banking Services Based On J2ME/J2EE†, CADSM’2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,†Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literature†, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,†Secure end-to-end mobile payment System†. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,†MMPS: A Versatile Mobile-to-Mobile Payment System†, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,â₠¬ An Efficient Steganography Scheme for M- Commerce†. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, †Text Steganography in SMS†, 2007 International Conference on Convergence Information Technology. Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, †Secure Display and Secure Transactions Using a Handset†, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, â€Å"A Novel Security Mobile Payment System Based On Watermarked Voice Cheque†. M. Shirali-Shahreza, â€Å"Stealth Steganography in SMS†, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006. Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, â€Å"Security of Mobile Banking†. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud,† Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types†, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,† Implementation of LSB Steganography and its Evaluation for various bits†. ISSN : 0975-4024 Dec 2011- Jan 2012 479 How to cite Sms Banking, Essay examples Sms Banking Free Essays Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. We will write a custom essay sample on Sms Banking or any similar topic only for you Order Now And Technology, Nagpur, India manoj_bramhe@yahoo. com Abstract— M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services. Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain text form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost. In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2]. Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, it is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability. Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking. Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objective is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into the GSM standard for support of transmitting information over the signalling channels of the GSM network. USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking. The consumer’s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumer’s mobile banking menu within the SIM card. STK is the most secure method of mobile banking. It allows the bank to load its own encryption keys onto the SIM card with the bank’s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily hacked by any hacker or seen by anyone from message inbox. Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired transaction. Device constraints raise the questions as to wh ether there will be adequate security for users without compromising the ease of use and speed. Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024 Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techniques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message Service Short Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM). Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks. An SMS Gateway allows interfacing software applications to send and/or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile. Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database. Bank sends Customer–side mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuously. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server. Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner. We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original senderâ€℠¢s address by altering respective field in original SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available. V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation. Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fields’s to accommodate for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fields’s as shown in above figure. Account Number: – It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: – It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted session keys stored in file, which will be stored on customer handset. ISSN : 0975-4024 Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: – This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: – Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS. MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS. After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset. Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message. Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer. Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number. If match is not found, it will send message â€Å"Wrong Account Number† to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message â€Å"Wrong Pin Number† to customer handset. Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side â€Å"Fake Transaction† and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset. VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server. Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm don’t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation property of encryption. Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed. This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance. This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system. The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB. Net server side application. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out. Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â€Å"Mobile banking Services in bank area†, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,†Spanish Mobile Banking Services: An Adoption Study†, Proceedings of the International Conference on Mobile Business 2005. Mohammad Shirali-Shahreza,†Improving Mobile Banking Security Using Steganography â€Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,†Mobile Banking Services Based On J2ME/J2EE†, CADSM’2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,†Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literature†, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,†Secure end-to-end mobile payment System†. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,†MMPS: A Versatile Mobile-to-Mobile Payment System†, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,â₠¬ An Efficient Steganography Scheme for M- Commerce†. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, †Text Steganography in SMS†, 2007 International Conference on Convergence Information Technology. Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, †Secure Display and Secure Transactions Using a Handset†, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, â€Å"A Novel Security Mobile Payment System Based On Watermarked Voice Cheque†. M. Shirali-Shahreza, â€Å"Stealth Steganography in SMS†, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006. Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, â€Å"Security of Mobile Banking†. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud,† Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types†, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,† Implementation of LSB Steganography and its Evaluation for various bits†. ISSN : 0975-4024 Dec 2011- Jan 2012 479 How to cite Sms Banking, Papers