Abstract
As the well-developed civilian wireless network infrastructure was built and the mobile devices becoming increasingly widespread, many mobile police information systems were established to provide information for police anywhere and anytime. The (SMS) Short Message Service is a widely used communication means in these applications. But lacking of security for SMS makes it unsuitable for transmitting these confidential data. In this paper, we discuss the security requirements of the mobile police information system firstly, and then propose a security strategy for mobile police information system to transmit information confidentially over the public mobile network using SMS as a bearer, and describe the authentication and communication protocol in detail. Lastly a performance comparison of the mobile police information system working in secure mode with that working in ordinary mode is given.
Similar content being viewed by others
References
Lien, Y.-N., et al. (1998). Network architecture for a mobile police information system. 1998 Workshop on distributed system technology and applications, May 14–15, 1998.
Chang Z. (2005) Police information inquiring system. Police Technology, 3: 9–13
Lu F. (2006) Research and implementation of information system for police. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 5: 91–94
Pica, D., Sorensen, C., & Allen, D. (2004). On mobility and context of work: Exploring mobile police work, 2004. In Proceedings of the 37th Annual Hawaii International Conference on System Sciences (11 pp.), 5–8 January 2004.
SMS used by police. Available from http://www.textually.org/textually/archives/cat_sms_used_by_the_police.htm.
Grecas C.F., Maniatis S.I., Venieris I.S. (2003) Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration. Mobile Networks and Applications, 8(2): 145–150
Guthery S.B., Cronin M.J. (2002) Mobile application development with SMS and the SIM toolkit. McGraw-Hill Companies, Inc., New York
Lai, Y.-P., & Tai, J.-H. (2007). Network security improvement with isolation implementation based on ISO-17799 standard. In Proceedings of First International Conference on Network-Based Information Systems (pp. 69–78), Regensburg, Germany, September 3–7, 2007.
Wang, Z.-H., & Han, D.-W. (2003). The physical isolation switches: Introduction and practice. China Pattern: CN1464403 (December 31, 2003) Network Gap.
SMS Forum. Short message peer-to-peer protocol specification version 5.0. Available from http://www.smsforum.net.
Shieh S.P., Ho F.S., Huang Y.L. (1999) An efficient authentication protocol for mobile networks. Journal of Information Science and Engineering, 15: 505–520
Hwang R.-J., Su F.-F. (2005) A new efficient authentication protocol for mobile networks. Computer Standards & Interfaces, 28(2): 241–252
Juang W.S. (2004) Efficient password authenticated key agreement using smart cards. Computers & Security, 23(2): 167–173
Sun H.M. (2000) An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(4): 958961
Walter, T., et al. (2004). Secure mobile business applications framework, architecture and implementation. Information Security Technical Report (Vol. 9, Issue 4, pp. 6–2), December 2004.
Chien H.Y., Jan J.K. (2003) A hybrid authentication protocol for large mobile network. The Journal of Systems and Software, 67: 123130
Hassinen, M. (2005). SafeSMS—end-to-end encryption for SMS messages. In Proceedings of the 8th International Conference on Telecommunications (Vol. 2, pp. 359–365), June 15–17, 2005.
Hassinen, M., & Hypponen, K. (2005). Strong mobile authentication. In 2nd International Symposium on Wireless Communication Systems (pp. 96–100), 5–7 September 2005.
Chanson, S., & Cheung, T. (2001). Design and implementation of a PKI-based end-to-end secure infrastructure for mobile e-commerce. In Proceedings of the Second International Conference on Web Information Systems Engineering (Vol. 1, pp. 3–7), 3–6 December 2001.
Park C.S. (1997) On certificate-based security protocols for wireless mobile communication systems. IEEE Network, 11(5): 50–55
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
He, R., Qin, Z., Wang, F. et al. Security Strategy for Mobile Police Information System Using SMS. Wireless Pers Commun 51, 349–364 (2009). https://doi.org/10.1007/s11277-008-9647-2
Received:
Accepted:
Published:
Issue date:
DOI: https://doi.org/10.1007/s11277-008-9647-2

