Integration of IMEI, RSA, and Signature to Secure Communication in Mobile Applications

Integration of IMEI, RSA, and Signature to Secure Communication in Mobile Applications

Nawal Sad Houari, Fatima Kabli, Affaf Matoug
Copyright: © 2022 |Pages: 18
DOI: 10.4018/IJOCI.306979
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The mobile instant messaging applications have become a famous wireless service in the world allowing a user to communicate with anyone in anywhere. Consequently, the manipulation of the user data creates a pressing need for securing the information and the associated technologies. The protection of these communications has become a paramount objective. The concept of cryptography has become a basic concept in communication and the exchange of messages within companies. This paper presents a hybrid security system allowing messages to be exchanged within a company in a secure manner. Our goal is to provide end-to-end encryption through the combination of asymmetric cryptography, signature, and integration of IMEI parameter. The confidentiality of the messages is ensured by the RSA algorithm, while the integrity of these messages and the sender authentication are ensured by the digital signature, that is carried out with the SHA-2 hash function.
Article Preview
Top

In this section, authors are going to present some related works dealing with security in mobile applications.

An android application allowing friends, colleagues, and associates to safely and securely chat together, named “SafeChat”, is presented by (Felter et al., 2020). Security is provided through the use of a standard encryption algorithm.

In order to overcome the problem of permissions on Android, the authors of (Feichtner and Gruber, 2020) propose an approach, based on machine learning, to identify the critical gaps between the behavior of the application described by the developer and the use of permissions through combining the advanced techniques in natural language processing, the deep learning and convolutional neural network.

Another approach for solving the authorization problem in Android and detecting malware is presented in (Olukoya et al., 2019), through the correspondence between the authorization requested by an application and the natural language description of the application.

In order to protect the phone and detect unauthorized or illegitimate users, the authors of (Chandrasekara et al., 2020) suggest an approach for monitoring the user’s behavior through studying a few parameters namely: keystroke dynamics, location detection, voice recognition, and the application usage.

The work presented in (Alkhattabi et al., 2020) aims to analyze the security, the privacy, and the confidentiality of Family Locator applications, which often collect a lot of sensitive information such as: the users’ location and contacts. For doing this, they analyze the permissions requested by 41 FL apps, available on the Google Play Store, in order to understand the type of the collected sensitive information and analyze the network traffic and the local storage of these applications to identify the potential sensitive information leaks.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022)
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing