Skip to main content
Log in

Security Strategy for Mobile Police Information System Using SMS

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

As the well-developed civilian wireless network infrastructure was built and the mobile devices becoming increasingly widespread, many mobile police information systems were established to provide information for police anywhere and anytime. The (SMS) Short Message Service is a widely used communication means in these applications. But lacking of security for SMS makes it unsuitable for transmitting these confidential data. In this paper, we discuss the security requirements of the mobile police information system firstly, and then propose a security strategy for mobile police information system to transmit information confidentially over the public mobile network using SMS as a bearer, and describe the authentication and communication protocol in detail. Lastly a performance comparison of the mobile police information system working in secure mode with that working in ordinary mode is given.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price includes VAT (Netherlands)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lien, Y.-N., et al. (1998). Network architecture for a mobile police information system. 1998 Workshop on distributed system technology and applications, May 14–15, 1998.

  2. Chang Z. (2005) Police information inquiring system. Police Technology, 3: 9–13

    Google Scholar 

  3. Lu F. (2006) Research and implementation of information system for police. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 5: 91–94

    Google Scholar 

  4. Pica, D., Sorensen, C., & Allen, D. (2004). On mobility and context of work: Exploring mobile police work, 2004. In Proceedings of the 37th Annual Hawaii International Conference on System Sciences (11 pp.), 5–8 January 2004.

  5. SMS used by police. Available from http://www.textually.org/textually/archives/cat_sms_used_by_the_police.htm.

  6. Grecas C.F., Maniatis S.I., Venieris I.S. (2003) Introduction of the asymmetric cryptography in GSM, GPRS, UMTS, and its public key infrastructure integration. Mobile Networks and Applications, 8(2): 145–150

    Article  Google Scholar 

  7. Guthery S.B., Cronin M.J. (2002) Mobile application development with SMS and the SIM toolkit. McGraw-Hill Companies, Inc., New York

    Google Scholar 

  8. Lai, Y.-P., & Tai, J.-H. (2007). Network security improvement with isolation implementation based on ISO-17799 standard. In Proceedings of First International Conference on Network-Based Information Systems (pp. 69–78), Regensburg, Germany, September 3–7, 2007.

  9. Wang, Z.-H., & Han, D.-W. (2003). The physical isolation switches: Introduction and practice. China Pattern: CN1464403 (December 31, 2003) Network Gap.

  10. SMS Forum. Short message peer-to-peer protocol specification version 5.0. Available from http://www.smsforum.net.

  11. Shieh S.P., Ho F.S., Huang Y.L. (1999) An efficient authentication protocol for mobile networks. Journal of Information Science and Engineering, 15: 505–520

    Google Scholar 

  12. Hwang R.-J., Su F.-F. (2005) A new efficient authentication protocol for mobile networks. Computer Standards & Interfaces, 28(2): 241–252

    Article  MathSciNet  Google Scholar 

  13. Juang W.S. (2004) Efficient password authenticated key agreement using smart cards. Computers & Security, 23(2): 167–173

    Article  Google Scholar 

  14. Sun H.M. (2000) An efficient remote user authentication scheme using smart cards. IEEE Transactions on Consumer Electronics, 46(4): 958961

    Google Scholar 

  15. Walter, T., et al. (2004). Secure mobile business applications framework, architecture and implementation. Information Security Technical Report (Vol. 9, Issue 4, pp. 6–2), December 2004.

  16. Chien H.Y., Jan J.K. (2003) A hybrid authentication protocol for large mobile network. The Journal of Systems and Software, 67: 123130

    Article  Google Scholar 

  17. Hassinen, M. (2005). SafeSMS—end-to-end encryption for SMS messages. In Proceedings of the 8th International Conference on Telecommunications (Vol. 2, pp. 359–365), June 15–17, 2005.

  18. Hassinen, M., & Hypponen, K. (2005). Strong mobile authentication. In 2nd International Symposium on Wireless Communication Systems (pp. 96–100), 5–7 September 2005.

  19. Chanson, S., & Cheung, T. (2001). Design and implementation of a PKI-based end-to-end secure infrastructure for mobile e-commerce. In Proceedings of the Second International Conference on Web Information Systems Engineering (Vol. 1, pp. 3–7), 3–6 December 2001.

  20. Park C.S. (1997) On certificate-based security protocols for wireless mobile communication systems. IEEE Network, 11(5): 50–55

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rongyu He.

Rights and permissions

Reprints and permissions

About this article

Cite this article

He, R., Qin, Z., Wang, F. et al. Security Strategy for Mobile Police Information System Using SMS. Wireless Pers Commun 51, 349–364 (2009). https://doi.org/10.1007/s11277-008-9647-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue date:

  • DOI: https://doi.org/10.1007/s11277-008-9647-2

Keywords