.

Saturday, March 9, 2019

Sms Banking

Ma no. V, Bramhe / internationalist ledger of engine room and engineering Vol. 3 (6), 2011, 472-479 SMS BASED SECURE bustling BANKING Manoj V, Bramhe De scatterment of In changeion engineering, RTM Nagpur university St. Vincent P everyotti College of Engg. And Technology, Nagpur, India emailprotected com hoist M- swaning has emerged as one of the main subdivision of m-commerce. industrious entrusting religious operate consists of teaching inquiry, nonifications and alerts, coer chargeing programs and payment point. sprightly raise exertion is apply for connecting guest handset with patois host for alone such(prenominal) answers.Current M- savings banking exertions utilise by banks ar facing bail measures ch aloneenges for payment transfer banks be employ fixate payment gateway and varied pledge measures which increases be and infrastructure for bank exactly major day-to-day banking activitys argon inquiries, notifications and alerts. The p roblem with current banking practical trading operations is that they lodge info promptly to guest in field of view text editionual matterual matter edition edition dramatis personae flexible with aegis. We certify SMS establish unspoiled vigorous banking which enhances pledge with stripped bell.In this approach bank hides guest effect in coiffureion is unshakable SMS development AES par each(prenominal)el cryptological algorithmic programic program and direct it node activity corroborationed handset. lymph node exercise decodes data in unassailable manner. Keywords M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking remains is one which nominates wholly daily banking operations to guest with one cut by dint of of his diligent handset with support coating program. M-banking agreement has potential to provide feeler or delivery of very specialized and passing incumbent tuition to guest as given in 2.Growth in the M- depositing i s driven by discordant facilities the ilk convenience of banking operations, greater reach to consumers and Integration of other m-commerce run with come let on of the closeticious banking. In M-banking in that location is no place restriction, it is highly penetration coefficient as growth of winding telephone sets argon more than than routiners, it is richly personalized and private increasing effect authenticity and is 100% obtainable all the fourth dimension with drug social functionrs. However, in that respect atomic tot 18 several challenges that motivation to be addressed to completely utilize the benefits of the M- banking comp whatsoevering homogeneous handset compatibility, bail, scalability, reliability.Due to increase in persona of agile handsets for mevery m-commerce coverings, Chances of nomadic hacking for financial benefits argon firmly increased. Currently intimatelyly all banks in India and out ramp argon throwing text SMS directl y to the guest handset for basic bank service without whatsoever surety which give the axe be doored by any bitchy person and hind end drug abuse this randomness for pick upting access to node invoice. OTA (Over-the-air) uns postpone data rear end be hacked in net dissemble roadway from bank to client rambling handset including MPIN, a password use for drug user identification in M-banking.Thus at that place is a need of apprehend and cost effective closure which shadower be easily provided on all roles of handsets. Our objective is to provide cost effective, plug, fast M-banking settlement unite features of cryptography. In this paper we drop pre directed SMS ground untroubled bustling banking with tokenish cost employ cryptography. II. M-BANKING CHANNELS M-banking fuel be executed utilise various distri bution avenues corresponding SMS, USSD, GPRS, WAP mobilise based activity, SIM proveing. All of these transmit ar employ separately or combined for various banking operations ISSN 0975-4024 regrets 2011- Jan 2012 472Manoj V, Bramhe / transnational journal of engineering science and Technology Vol. 3 (6), 2011, 472-479 A. ill-con arrayred cognitive content advantage (SMS) SMS is the simplest exploit of wandering banking. It is largely employ for breeding-based services. SMS has the supreme reach amongst consumers since all the mobile phones support SMS. hornswoggle substances argon chime ind and foreed by SMS focuss. These marrows demand roughly security issues. B. unregulated Supplementary function tar (USSD) USSD is a technology unique to GSM. It is a capability built into the GSM beat for support of transmitting tuition everywhere the repointling notes of the GSM profit.USSD provides seance-based communication. Turnaround solution times for interactive coats are terseer for USSD than SMS. In USSD, the interaction is in the form of a continuous posing as opposed to SMS. USSD is a vailable on all handsets. C. Wireless diligence communications protocol (WAP) / General Packet tuner profit (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and population Wide Web access in mobile phones. . WAP is wireless application protocol employ everyplace GPRS. It is similar to Internet banking.The consumers handset needs to be WAP enabled. WAP banking is centripetal to similar threats as Internet banking. D. Phone-based Application Phone based applications are veritable in various languages like J2ME, . loot having advantages that it stern use GPRS, USSD or SMS, MMS to carry the consumer data/ nurture in an encrypted format and it is factor in pendent. These are rock-steady application which resides on support handset. E. SIM Application motherfucker Kit The SIM Application Toolkit allows for the service supplier o r bank to reside the consumers mobile banking poster at bottom the SIM bankers bill. STK is the about strong mode of mobile banking.It allows the bank to load its give birth encoding come upons onto the SIM card with the banks own developed application. III. circulating(prenominal) M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and gimcrack channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not development any encoding techniques in SMS based M-banking agreement. They are exploitation simple text based SMS for node queries in which they directly appoint count on information to customer but hiding nigh digits of account bit which displace be easily hacked by any hacker or seen by anyone from put across inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset hence there is a need of pimp and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards The everyplaceleap of standards gives rise to lot of local anaesthetic and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and silence c formerlyrns of customers as well as interoperability among various implementations. ) Device constraints at that place are technical issues cogitate to the mobile twistings . The mobile phones suffers from various constrains like less transiting origin and memory, bandwidth, shortstop battery life , betray disconnections, tiny screens, poor resolution and deepiveness issues. 3) Security Issues Securing m- art is even more difficult than wired perpetrateance. Device constraints climbing the questions as to whether there go outing be adequate security for users without compromising the ease of use and speed.Current accredited time M-banking application of various banks uses unmixed text substances without any security algorithm for substantiate offing data therefrom any malicious user can access customer authorized data on mobile and apply it for malicious purpose thus direct displace of data is not suggestible for M-banking. SMS are given over to spoofing and there are issues related to SMS encryption. However technology manufacturers are create improved security for applications with earmark and encryption technologies and many claims that the ISSN 0975-4024 downslope 2011- Jan 2012 473 Manoj V, Bramhe / transnational journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 achievement development mobile device is fully furbish up. There are many techniques for reassure M-banking operations but major research work has been forefathere on cryptogram and steganography techniques. Cryptography is a work at of converting nakedtext data into depend text use cryptographical algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. underlyings of Short center ServiceShort centre Service (SMS) is the ability to position and happen text communicates to and from mobile telephones. SMS was launched as a section of GSM1 standard. Each short gist is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service this means that kernels are not sent directly to the liquidator but via a network SMS Centre. SMS comprises two basic point-to-point services as unsettled-originated short nub (MO-SM) and unsettled-terminated short pass along (MT-SM). runny-originated short kernels are transported from MOcapable handset to SMSC whereas rambling-terminated short capacitys are transported from SMSC to the handsets. The figure no. 1 shows a veritable(prenominal) orga nization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the headstrong network or a mobile station, brings or sends SMS. The SMSC usually has a configurable time limit for how considerable it pull up stakes store the message. SMS accession SMS Gateway is an interface between package applications mobile networks.An SMS Gateway allows interfacing package applications to se nd and/or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses free text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed upright M-banking is based on radial cryptographic techniques where plebeian secret unwrap is shared among bank customer and bank host. Proposed Architecture consists of 4 components as client bustling application, margin host application, Bank side mobile / GSM Modem, Bank database and wireless OTA 1. Our solution uses windows mobile as client application political platform and . simoleons textile as master of ceremonies side software. Customer int erested in victimization M-Banking facilities has to make registration solitary(prenominal) erst with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customerside mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with redeem seance reveal option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming unspoilt SMS and send message screen to send SMS to legion GSM handset /Modem. Application will be updated as and when bank updates it. ISSN 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / multinational Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will bemuse GSM mobile handset / GSM modem affiliated to bank application emcee. GSM handset will be affiliated to application host using either Bluetooth or USB cable having SIM card installe d in it which has task of receiving, affect and answering customer SMS continuously. GSM handset/ modem are cheaper and can be easily installed but puzzle slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. underwrite M-Banking waiter side application is developed in windows congenial environment like VB. meshwork which can be installed on bank application master of ceremonies.Application is consisting of SMS Service, randomness Manage, storey Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is creditworthy for retrieving and replying secure SMS automatically whenever they reaches host GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, note information and transaction information. Bank database stores customer confidential information like his MPIN, energetic identi fication pin and encryption samaras in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide posing based security but they are handset dependent and likewise in inelegant bureau of India all mobile operators are not providing respective services. USSD is utilise along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely apply channel which is device independent. Current SMS based M-banking service has many draw bottoms s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM computer computer architecture 16. Major issues with SMS based banking are SMS Spoofing which is an fervidness where malicious user sends out SMS me ssage which appears to be sent by lord sender. Current SMS architecture allows hiding original senders address by fixation respective field in original SMS header. Also SMS has encryption nevertheless during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET manikin runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides pointless security along with gratifying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our agreement is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. deposit SMS Message organize The secured SMS message is divided into multiple fields to accommodate for the various security go fors required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each tagged structure is explained below. circular zero(prenominal) Session Key Cipher text edition (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message contribute Fig. 2. plug away SMS message Structure tell SMS message structure proposed by us consists of 4 fieldss as shown in preceding(prenominal) figure.Account Number It is customer account number in bank which is freshman field used for authentication purpose. This information is stored in plain running format so that at the server end, information can be retrieved to convey required severalizes from database. Session cite It is onetime key helter-skelter generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted session keys stored in file, which will be stored on customer handset. ISSN 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / world-wide Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text This text is created from combining of plain text and MPIN and stored in 3rd filed of message structure. principal(prenominal) idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message contract Message permit is used for checking integrity. Customer message digest is careful from combination of plain text and MPIN and stored in quaternate field of secure SMS.MD5 algorithm is used to calcula te message digest on two ends. This true digest will be compared with calculated digest at bank server end , if not found of same size of it then message will be discarded as form transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will visualise 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added excogitation of one time session key. legion uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and prey details of 6-digit account number, 4-digit MPIN and 4digit password and tattle button to get session key. server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to succeeding(a) screen. Mobile client application shows 4 entries on next screen consisting of session key sure, generated fixed plain text message depending upon transaction chosen, nil text created from combination of plain text and MPIN and 4- bug out secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from innkeeper Module Proposed legion is running on computer installed with required so ftware like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and horde side application. Server side application has four modules as SMS Service, knowledge Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and trace it to get original doubt send by customer.Server application process head, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction interrogate to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid swamp of message inbox. We have used ActiveX hold in for this purpose. Bank Server application smashs received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found , it will send message improper Account Number to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message Wrong Pin Number to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side Fake Transaction and sends zipper to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / internationalist Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs cruciate encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm dont have non-repudiation as both party shares common secret key but we have used session key image for maintaining non-repudiation property of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot disavow that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, baulk Book Request, Cheque Stop request, Pay accounting and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server s ide SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get reply data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. starting time part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / worldwide Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure transcription, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for vary banking transaction and under various security threatening malicious activities were recorded. action of the transaction is studied. We have executed a couple of(prenominal) banking transaction from HTC windows mobile and using VB.Net server side application. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like sea squab can be attempt out.Steganogrpahy can also be utilise for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES 1 2 3 4 5 Mohammad Shir ali-Shahreza and M. Hassan Shirali-Shahreza, Mobile banking Services in bank area, SICE Annual convocation 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,Spanish Mobile Banking Services An bridal Study, proceeding of the International host on Mobile Business 2005.Mohammad Shirali-Shahreza,Improving Mobile Banking Security Using Steganography , International conclave On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,Mobile Banking Services Based On J2ME/J2EE, CADSM2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,Adoption of Mobile, Commerce Services by Individuals A Meta-Analysis of the Literature, Sixth International Conference on the trouble of Mobile Business . ISSN 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 6 7 8 9 10 11 12 13 14 15 16 T N T Nguyen, P Shum and E H Chua,Secure end-to-end mobile payment body. Ashutosh Saxena, M anik Lal Das and Anurag Gupta,MMPS A various(a) Mobile-to-Mobile Payment agreement, legal proceeding of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,An Efficient Steganography Scheme for M- Commerce. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Text Steganography in SMS, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, Secure ostentation and Secure Transactions Using a Handset, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, A falsehood Security Mobile Payment System Based On Watermarked interpretive program Cheque. M. Shirali-Shahreza, Stealth Steganography in SMS, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical communications engagements 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, Security of Mobile Banking. D illa Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud, Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types, International Journal of Network Security, Volume 11, September 2010. Managing the seek of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal, implementation of LSB Steganography and its Evaluation for various bits. ISSN 0975-4024 Dec 2011- Jan 2012 479Sms BankingManoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India emailprotected com Abstract M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services.Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain text form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost.In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in 2.Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, it is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability.Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking.Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objective is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN 0975-4024 Dec 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering a nd Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into the GSM standard for support of transmitting information over the signalling channels of the GSM network.USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP a ccess, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumers handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumers mobile banking menu within the SIM card. STK is the most secure method of mobile banking.It allows the bank to load its own encryption keys onto the SIM card with the banks own developed application. III. CURRENT M-BANKING Ev en though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily hacked by any hacker or seen by anyone from message inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues Securing m-Commerce is even more difficult than wired transaction. Device constraints raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturer s are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techniques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message ServiceShort Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Serv ice is a store and forward service this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of m essages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and/or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA 1. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customerside mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuously. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and reply ing secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture 16. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original senders address by altering respective field in original SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along wit h satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fieldss to accommodate for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fieldss as shown in above figure.Account Number It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at th e server end, information can be retrieved to get required keys from database. Session key It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted session keys stored in file, which will be stored on customer handset. ISSN 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest Message digest is used for checking integrity. C ustomer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time s ession key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receivi ng and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a pla in text 6-digit account number and compares it with database stored account number.If match is not found, it will send message Wrong Account Number to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message Wrong Pin Number to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side Fake Transaction and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server ap plication process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure S MS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm dont have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation property of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to ser ver. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only ge t final query results in plain text format but for result purpose we have shown this screen. ISSN 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decr ypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side application. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encry ption keys on SIM. REFERENCES 1 2 3 4 5 Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Mobile banking Services in bank area, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,Spanish Mobile Banking Services An Adoption Study, Proceedings of the International Conference on Mobile Business 2005.Mohammad Shirali-Shahreza,Improving Mobile Banking Security Using Steganography , International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,Mobile Banking Services Based On J2ME/J2EE, CADSM2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,Adoption of Mobile, Commerce Services by Individuals A Meta-Analysis of the Literature, Sixth International Conference on the Management of Mobile Business . ISSN 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 6 7 8 9 10 11 12 13 14 15 16 T N T Nguyen, P Shum and E H Ch ua,Secure end-to-end mobile payment System. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,MMPS A Versatile Mobile-to-Mobile Payment System, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,An Efficient Steganography Scheme for M- Commerce. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, Text Steganography in SMS, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, Secure Display and Secure Transactions Using a Handset, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, A Novel Security Mobile Payment System Based On Watermarked Voice Cheque. M. Shirali-Shahreza, Stealth Steganography in SMS, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, Security of Mobile Banking. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud, Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal, Implementation of LSB Steganography and its Evaluation for various bits. ISSN 0975-4024 Dec 2011- Jan 2012 479

No comments:

Post a Comment