BANKS SHORT MESSAGE SERVICE THREATS NOTIFICATION SYSTEM ON ANDROID BASED PHONE

  • Ishaq umar Muhammad Federal university of Lafia
  • Muhammad Mukhtar Liman
  • Joshua Abah
  • Timothy Moses
  • J. Agushaka
Keywords: Android Device, Bank SMS, Authentication, Notification, Security

Abstract

This research is carried out for the development and implementation of an end-to-end encrypted Short Message Service (SMS) App, utilizing a hybrid cipher algorithm, driven by the notable insecurity observed in SMS communications on mobile devices. SMS is a widely used communication method, and the primary goal of this study is to create a system (App) for end-to-end encrypted SMS. Loss of phones is becoming vulnerable for threats, because we store vital records in android and these records are secret such that no other third party is required to see them, such as Bank SMS, Event Notification etc. Also this information can be compromised if android phone is been lost and found by the criminals. Kidnapping activity is serious case happening in northern part of Nigeria, so if a phone is being lost and discovered how financed he is (the device holder), there is any means of bank account compromisation as that would allow the bank to give some information about the account because of the registered SIM card inserted in android devices (phones). This system is aimed to secure Bank SMS by not allowing an unauthorized person to views the banks SMS, but all other SMS can be view. Whenever the Banks SMS is received by the Android phone, the system will encrypt it and can only be viewed if using correct decryption key, a notification will be sent to the owner other phone if more than two attempt to view the message is made, using a Hybrid Cipher...

References

Abah, J. (2022). Mobile Security: A Review 1. 6(1), 601004.

Abiodun, M. K., Imoize, A. L., Awotunde, J. B., Lee, C.-C., Adeniyi, A. E., Chioma, U., & Li10, C.-T. (2023). Analysis of a Double-stage Encryption Scheme Using Hybrid Cryptography to Enhance Data Security in Cloud Computing Systems. Journal of Library and Information Studies, 21(2), 1–26.

Agwanyanjaba, W. O. (2020). Enhanced Mobile Banking Security: Implementing Transaction Authorization Mechanism Via USSD Push. University of Nairobi.

Ahmad, Z., Ong, T. S., Gan, Y. W., Liew, T. H., & Norhashim, M. (2022). Predictors of Employees’ Mobile Security Practice: An Analysis of Personal and Work-Related Variables. Applied Sciences (Switzerland), 12(9). https://doi.org/10.3390/app12094198 DOI: https://doi.org/10.3390/app12094198

Akande, O. N., Gbenle, O., Abikoye, O. C., Jimoh, R. G., Akande, H. B., Balogun, A. O., & Fatokun, A. (2023). SMSPROTECT: An automatic smishing detection mobile application. ICT Express, 9(2), 168–176. DOI: https://doi.org/10.1016/j.icte.2022.05.009

Al-Janabi, S., Al-Shourbaji, I., Shojafar, M., & Abdelhag, M. (2018). Mobile Cloud Computing: Challenges and Future Research Directions. Proceedings - International Conference on Developments in ESystems Engineering, DeSE, February 2018, 62–67. https://doi.org/10.1109/DeSE.2017.21 DOI: https://doi.org/10.1109/DeSE.2017.21

Almomani, I. M., & Khayer, A. Al. (2020). A Comprehensive Analysis of the Android Permissions System. IEEE Access, 8. https://doi.org/10.1109/ACCESS.2020.3041432 DOI: https://doi.org/10.1109/ACCESS.2020.3041432

Alsaffar, M., Aljaloud, S., Mohammed, B. A., Al-Mekhlafi, Z. G., Almurayziq, T. S., Alshammari, G., & Alshammari, A. (2022). Detection of Web Cross-Site Scripting (XSS) Attacks. Electronics (Switzerland), 11(14), 1–13. https://doi.org/10.3390/electronics11142212 DOI: https://doi.org/10.3390/electronics11142212

Altulaihan, E., & Almaiah, M. A. (2022). Cybersecurity Threats , Countermeasures and Mitigation Techniques on the IoT : Future Research Directions. 1–41. DOI: https://doi.org/10.3390/electronics11203330

Anmulwar, S., Srivastava, S., Mahajan, S. P., Gupta, A. K., & Kumar, V. (2019). Rogue access point detection methods: A review. 2014 International Conference on Information Communication and Embedded Systems, ICICES 2014, July 2018. https://doi.org/10.1109/ICICES.2014.7034106 DOI: https://doi.org/10.1109/ICICES.2014.7034106

Aqel, M. J., Naqshbandi, O. A., Sokiyna, M., & Valentyn, P. (2020). Messaging System Design Based on Using Servers and Encoding System. 14(10), 107–127. DOI: https://doi.org/10.3991/ijim.v14i10.15189

Barth, S., de Jong, M. D. T., Junger, M., Hartel, P. H., & Roppelt, J. C. (2019). Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and Informatics, 41(February 2019), 55–69. https://doi.org/10.1016/j.tele.2019.03.003 DOI: https://doi.org/10.1016/j.tele.2019.03.003

Bekkem Sumanth Reddy, M. S. P. H. S. S. K. (2021). IRJET- Android based Secure End to End Encrypted SMS System. Irjet, 8(4), 2982–2988.

Bongard-Blanchy, K., Sterckx, J. L., Rossi, A., Distler, V., Rivas, S., & Koenig, V. (2022). An (Un)Necessary Evil - Users’ (Un)Certainty about Smartphone App Permissions and Implications for Privacy Engineering. Proceedings - 7th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2022, 173–180. https://doi.org/10.1109/EuroSPW55150.2022.00023 DOI: https://doi.org/10.1109/EuroSPW55150.2022.00023

Callanan, C. (2021). User tolerance of privacy abuse on mobile Internet and the country level of development. September 2019. https://doi.org/10.1177/0266666915571171 DOI: https://doi.org/10.1177/0266666915571171

Chin, Amita; Jones, Beth; Little, P. (2021). A Comparative Analysis of Smartphone Security Behaviors and Practices Amita Chin Virginia Commonwealth University , United States Beth Jones Western Carolina University , United States Philip Little. 17(3), 57–80.

Chin, E., Felt, A. P., Sekar, V., & Wagner, D. (2020). Measuring user confidence in smartphone security and privacy. SOUPS 2012 - Proceedings of the 8th Symposium on Usable Privacy and Security, 1. https://doi.org/10.1145/2335356.2335358 DOI: https://doi.org/10.1145/2335356.2335358

Ciaramitaro, B., & Pavlov, V. (2011). Mobile security. In Mobile Technology Consumption: Opportunities and Challenges. https://doi.org/10.4018/978-1-61350-150-4.ch013 DOI: https://doi.org/10.4018/978-1-61350-150-4.ch013

David-West, O., Oni, O., & Ashiru, F. (2022). Diffusion of innovations: Mobile money utility and financial inclusion in Nigeria. Insights from agents and unbanked poor end users. Information Systems Frontiers, 24(6), 1753–1773. DOI: https://doi.org/10.1007/s10796-021-10196-8

Ekwonwune, E. N., & Enyinnaya, V. C. (2020). Design and Implementation of End to End Encrypted Short Message Service (SMS) Using Hybrid Cipher Algorithm. Journal of Software Engineering and Applications, 13(03), 25–40. https://doi.org/10.4236/jsea.2020.133003 DOI: https://doi.org/10.4236/jsea.2020.133003

Elueze, C. N., & Obasi, C. U. (2022). 5G and The Industry: A Case of the Nigerian Financial Technology Sector.

Elvira Cruz, I. (2023). Design of a methodology for the selection of mobile payment technologies in developing countries.

Enyinnaya, V. C., Ekwonwune, E. N., Osuagwu, O. E., Agbakuru, A. O., & Amanze, B. C. (2021). Applications of End-to-End Encrypted Short Message Service ( SMS ) using Hybrid Encryption Algorithm. 12(6), 176–181.

Evans. (2018). Improved financial performance without improved operational efficiency: The case of Nigerian firms. Forum Scientiae Oeconomia, 6, 25.

Ferm, L.-E. C., & Thaichon, P. (2021). Customer pre-participatory social media drivers and their influence on attitudinal loyalty within the retail banking industry: A multi-group analysis utilizing social exchange theory. Journal of Retailing and Consumer Services, 61, 102584. DOI: https://doi.org/10.1016/j.jretconser.2021.102584

Fletcher, B. (2019). Application using ECC algorithm and QR.pdf.

Frik, A., Kim, J., Sanchez, J. R., & Ma, J. (2022). Users ’ Expectations About and Use of Smartphone Privacy and Security Settings. DOI: https://doi.org/10.1145/3491102.3517504

Garba, F. A. (2019). TextFort: An Efficient Hybrid Short Message Service Encryption Scheme for Mobile Devices. Scientific and Practical Cyber Security Journal.

Ghadirli, H. M., Nodehi, A., & Enayatifar, R. (2019). An overview of encryption algorithms in color images. Signal Processing, 164(September 2018), 163–185. https://doi.org/10.1016/j.sigpro.2019.06.010 DOI: https://doi.org/10.1016/j.sigpro.2019.06.010

Grandis, mohamad regiana, & Yunanto, R. (2020). Jurnal Teknik Informatika, Vol. 12, No. 2, April 2020. Jurnal Teknik Informatika, 12(2), 46–51. https://www.researchgate.net/profile/Rio-Yunanto/publication/344596492_Perancangan_Sistem_Informasi_Iuran_Bulanan_Santri_Pada_Pondok_Pesantren_Sukamiskin_Bandung_Berbasis_Mobile_Web/links/5f832989299bf1b53e1e3d5d/Perancangan-Sistem-Informasi-Iuran-Bulanan

Gupta, B. B., & Narayan, S. (2020). A survey on contactless smart cards and payment system: Technologies, policies, attacks and countermeasures. Journal of Global Information Management (JGIM), 28(4), 135–159. DOI: https://doi.org/10.4018/JGIM.2020100108

Hatamian, M., Wairimu, S., Momen, N., & Fritsch, L. (2021). A privacy and security analysis of early-deployed COVID-19 contact tracing Android apps. In Empirical Software Engineering (Vol. 26, Issue 3). Empirical Software Engineering. https://doi.org/10.1007/s10664-020-09934-4 DOI: https://doi.org/10.1007/s10664-020-09934-4

Jameaba, M.-S. (2022). Digitalization, Emerging Technologies, and Financial Stability: Challenges and Opportunities for the Indonesian Banking Industry and Beyond. DOI: https://doi.org/10.32388/CSTTYQ.2

Kalipi, A. (2023). Exploring the awareness of security threats associated with short-message service (sms) and protective measures against sms security threats amongst students at the University of Namibia (UNAM). University of Namibia.

Kim, Y., Oh, T., & Kim, J. (2023). Analyzing User Awareness of Privacy Data Leak in Mobile Applications. Mobile Information Systems. https://doi.org/10.1155/2015/369489 DOI: https://doi.org/10.1155/2015/369489

Krupp, B., Sridhar, N., & Zhao, W. (2017). SPE: Security and Privacy Enhancement Framework for Mobile Devices. IEEE Transactions on Dependable and Secure Computing, 14(4), 433–446. https://doi.org/10.1109/TDSC.2015.2465965 DOI: https://doi.org/10.1109/TDSC.2015.2465965

Lei, Z., Nan, Y., Fratantonio, Y., & Bianchi, A. (2021). On the Insecurity of SMS One-Time Password Messages against Local Attackers in Modern Mobile Devices. February. https://doi.org/10.14722/ndss.2021.24212 DOI: https://doi.org/10.14722/ndss.2021.24212

Liu, E., Rao, S., Havron, S., Ho, G., Savage, S., Voelker, G. M., & McCoy, D. (2023). No Privacy Among Spies: Assessing the Functionality and Insecurity of Consumer Android Spyware Apps. Proceedings on Privacy Enhancing Technologies, 2023(1), 207–224. https://doi.org/10.56553/popets-2023-0013 DOI: https://doi.org/10.56553/popets-2023-0013

Logunleko, A. M., Logunleko, K. B., Lawal, O. O., Ezugwu, O. O. D., & Akinyemi, O. S. (2021). A Secured Mobile Money Transaction Using Data Masking and Enhanced Base64 Algorithm. Int. J. Recent Contributions Eng. Sci. IT, 9(1), 17–32. DOI: https://doi.org/10.3991/ijes.v9i1.17803

Ma, S., & Chen, C. (2023). Are digital natives overconfident in their privacy literacy? Discrepancy between self-assessed and actual privacy literacy, and their impacts on privacy protection behavior. Frontiers in Psychology, 14(June 2022), 1–11. https://doi.org/10.3389/fpsyg.2023.1224168 DOI: https://doi.org/10.3389/fpsyg.2023.1224168

Mabruri, A. S. (2020). Data Security System of Text Messaging Based on Android Mobile Devices Using Advanced Encrytion Standard Dynamic. October 2000, 39–46.

Menard, P., & Bott, G. J. (2020). Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment. Computers and Security, 95, 101856. https://doi.org/10.1016/j.cose.2020.101856 DOI: https://doi.org/10.1016/j.cose.2020.101856

Mousavi, S. K., Ghaffari, A., Besharat, S., & Afshari, H. (2021). Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks, 27, 1515–1555. DOI: https://doi.org/10.1007/s11276-020-02535-5

Noviandy, T. R., Idroes, G. M., Maulana, A., Hardi, I., Ringga, E. S., & Idroes, R. (2023). Credit Card Fraud Detection for Contemporary Financial Management Using XGBoost-Driven Machine Learning and Data Augmentation Techniques. Indatu Journal of Management and Accounting, 1(1), 29–35. DOI: https://doi.org/10.60084/ijma.v1i1.78

Omolara, A. E., Jantan, A., Abiodun, O. I., Dada, K. V., Arshad, H., & Emmanuel, E. (2019). A deception model robust to eavesdropping over communication for social network systems. IEEE Access, 7, 100881–100898. DOI: https://doi.org/10.1109/ACCESS.2019.2928359

Onuwabhagbe OGBEIDE, V., OMOROGIUWA, O., & Eturpa SALAMI, E. (2023). an Empirical Survey To Substantiate the Need for a Cyber Security Framework for Smes in Nigeria. International Journal of Research Publications, 128(1), 9–24. https://doi.org/10.47119/ijrp1001281720235221 DOI: https://doi.org/10.47119/IJRP1001281720235221

Otor, S. U., Akumba, B. O., Idikwu, J. S., & Achika, I. P. (2020). An Improved Security Model for Nigerian Unstructured Supplementary Services Data Mobile Banking Platform. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 6(3), 974–987. DOI: https://doi.org/10.32628/CSEIT2063213

Pazarbasioglu, C., Mora, A. G., Uttamchandani, M., Natarajan, H., Feyen, E., & Saal, M. (2020). Digital financial services. World Bank, 54.

Prince, C., Omrani, N., Maalaoui, A., Dabic, M., & Kraus, S. (2023). Are We Living in Surveillance Societies and Is Privacy an Illusion? An Empirical Study on Privacy Literacy and Privacy Concerns. IEEE Transactions on Engineering Management, 70, 3553–3570. https://doi.org/10.1109/TEM.2021.3092702 DOI: https://doi.org/10.1109/TEM.2021.3092702

Priya, D., Reddi, T., Reddy, M. S. T., Khan, M. K., & others. (2023). A Comprehensive Examination of Email Spoofing: Issues and Prospects for Email Security. Computers & Security, 103600. DOI: https://doi.org/10.1016/j.cose.2023.103600

Radhi, S. M., & Ogla, R. (2023). In-Depth Assessment of Cryptographic Algorithms Namely DES, 3DES, AES, RSA, and Blowfish. Iraqi Journal of Computers, Communications, Control and Systems Engineering, 23(3), 125–138. DOI: https://doi.org/10.33103/uot.ijccce.23.3.11

Raharja, I. M. S., & Ashari, A. (2021). Enhancing Security System of Short Message Service for Banking Transaction. International Journal of Computing, 20(1), 31–38. https://doi.org/10.47839/ijc.20.1.2089 DOI: https://doi.org/10.47839/ijc.20.1.2089

Rahim Soomro, T., & Irshad, S. (2018). Identity Theft and Social Media. IJCSNS International Journal of Computer Science and Network Security, 18(1), 43. https://www.researchgate.net/publication/323185128

Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., & Seamons, K. (2019). A usability study of five two-factor authentication methods. Proceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019, 357–370.

Rihan, S. D., Khalid, A., Eldin, S., & Osman, F. (2019). A Performance Comparison of Encryption Algorithms AES and DES. International Journal of Engineering Research & Technology (IJERT), 4(12), 151–154. www.ijert.org

Sagheer, A. M., Abdulhameed, A. A., & Abduljabbar, M. A. (2019). SMS security for smartphone. Proceedings - 2013 6th International Conference on Developments in ESystems Engineering, DeSE 2013, February 2015, 281–285. https://doi.org/10.1109/DeSE.2013.57 DOI: https://doi.org/10.1109/DeSE.2013.57

Salim, A., Sagheer, A. M., & Yaseen, L. (2019). Design and Implementation of a Secure Mobile Banking System Based on Elliptic Curve Integrated Encryption Schema. International Conference on Applied Computing to Support Industry: Innovation and Technology, 424–438. DOI: https://doi.org/10.1007/978-3-030-38752-5_33

Sandhu, S., & Arora, S. (2022). Customers’ usage behaviour of e-banking services: Interplay of electronic banking and traditional banking. International Journal of Finance & Economics, 27(2), 2169–2181. DOI: https://doi.org/10.1002/ijfe.2266

Sari, M., Purnomo, H. D., & Sembiring, I. (2022). Review : Algoritma Kriptografi Sistem Keamanan SMS di Android. Journal of Information Technology, 2(1), 11–15. https://doi.org/10.46229/jifotech.v2i1.292 DOI: https://doi.org/10.46229/jifotech.v2i1.292

Scholar, M. T., & RGMCET, N. (2023). Easy and Secure Smart SMS Protocol on M-Health Environment in Mobile Computing.

Shen, B., Wei, L., Xiang, C., Wu, Y., Shen, M., Zhou, Y., & Jin, X. (2021). Can systems explain permissions better? Understanding users’ misperceptions under smartphone runtime permission model. Proceedings of the 30th USENIX Security Symposium, 751–768.

Shuba, A., Bakopoulou, E., & Markopoulou, A. (2018). Privacy Leak Classification on Mobile Devices. IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2018-June(i). https://doi.org/10.1109/SPAWC.2018.8445948 DOI: https://doi.org/10.1109/SPAWC.2018.8445948

Sitkowski, M., & Simulation, D. (2018). Securely Encrypting Data At Rest. February.

Souppaya, M., & Scarfone, K. (2023). Guidelines for Managing the Security of Mobile Devices in the Enterprise. NIST Special Publication 800-124, Revision 1, 1–30. http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf%5Cnpapers3://publication/doi/10.6028/NIST.SP.800-124r1

Stirparo, P. (2015). MobiLeak : security and privacy of personal data in mobile applications.

Thabit, F., Can, O., Wani, R. U. Z., Qasem, M. A., Thorat, S. B., & Alkhzaimi, H. A. (2023). Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms. Concurrency and Computation: Practice and Experience, e7691. DOI: https://doi.org/10.1002/cpe.7691

Ullah, I., Boreli, R., & Kanhere, S. S. (2023). Privacy in targeted advertising on mobile devices : a survey. International Journal of Information Security, 22(3), 647–678. https://doi.org/10.1007/s10207-022-00655-x DOI: https://doi.org/10.1007/s10207-022-00655-x

Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., & Kikiras, P. (2016). On the Security and Privacy of Internet of Things Architectures and Systems. Proceedings - 2015 International Workshop on Secure Internet of Things, SIoT 2015, 49–57. https://doi.org/10.1109/SIOT.2015.9 DOI: https://doi.org/10.1109/SIOT.2015.9

Visconti, A. (2018). The Dangers of Rooting : Data Leakage Detection in. 2018. DOI: https://doi.org/10.1155/2018/6020461

Vishnuvardhan, B., Manjula, B., & Lakshman Naik, R. (2020). A study of digital banking: Security issues and challenges. Proceedings of the Third International Conference on Computational Intelligence and Informatics: ICCII 2018, 163–185. DOI: https://doi.org/10.1007/978-981-15-1480-7_14

Wang, C., Wang, Y., Chen, Y., Liu, H., & Liu, J. (2020). User authentication on mobile devices: Approaches, threats and trends. Computer Networks, 170, 107118. https://doi.org/10.1016/j.comnet.2020.107118 DOI: https://doi.org/10.1016/j.comnet.2020.107118

Yadav, C. S., Singh, J., Yadav, A., Pattanayak, H. S., Kumar, R., Khan, A. A., Haq, M. A., Alhussen, A., & Alharby, S. (2022). Malware Analysis in IoT & Android Systems with Defensive Mechanism. Electronics (Switzerland), 11(15), 1–20. https://doi.org/10.3390/electronics11152354 DOI: https://doi.org/10.3390/electronics11152354

Yusuf, M., Gimba, U. A., Bello, A. U., Adamu, A. H., Salisu, S., State, J., & Science, C. (2019). Two Way Authentication for Android Mobile Phones. 5(1), 179–186.

Published
2024-04-30
How to Cite
MuhammadI. umar, LimanM. M., AbahJ., MosesT., & AgushakaJ. (2024). BANKS SHORT MESSAGE SERVICE THREATS NOTIFICATION SYSTEM ON ANDROID BASED PHONE. FUDMA JOURNAL OF SCIENCES, 8(2), 46 - 58. https://doi.org/10.33003/fjs-2024-0802-2339