Simple Mail Delivery Protocol

Recipient-Based Email Delivery with Anti-spam Support
  • Dimitris Zisiadis
  • Spyros Kopsidas
  • Leandros Tassiulas
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 399)


In this paper we propose a user based architecture for the email system, where the recipient of an email message manage its receipt in conjunction with both origin and destination email servers. Messages are kept to the origin email server until a confirmation from the recipient is issued though the destination email server. Therefore, spam email doesn’t travel the Internet and doesn’t overload the destination email server and recipient’s mailbox. White and black lists for (sender, email_server) pairs are built automatically following user evaluation. With our proposal, full control is delegated to the recipient over the email activity. On the server side, Simple Mail Delivery Protocol (SMDP) manages email delivery and options. SMDP server acts as a gateway for sending emails, a repository for the users’ mailboxes and a central point for managing user options related to email filtering and spam handling. The solution is suitable for group/business email handling.


e-mail privacy anti-spam SMDP SMTP 


  1. 1.
    Klensin, J.: Simple Mail Transfer Protocol. RFC5321 (2008)Google Scholar
  2. 2.
    Rose, M.: SMTP Service Extensions. RFC 1425 (1993)Google Scholar
  3. 3.
  4. 4.
    Ritchie, D., Thompson, K.: The UNIX Time-Sharing System. The Bell System Technical Journal (July-August 1978)Google Scholar
  5. 5.
    Myers, J., Rose, M.: Post Office Protocol – Version 3. RFC 1939 (1996)Google Scholar
  6. 6.
    Gellens, R., Newman, C., Lundblade, L.: POP3 Extension Mechanism. RFC 2449 (1998)Google Scholar
  7. 7.
    Crispin, M.: Internet Message Access Protocol – Version 4rev1. RFC 3501 (2003)Google Scholar
  8. 8.
    Messaging Anti-Abuse Working Group (MAAWG),
  9. 9.
    Park, J., Chong, E., Siegel, H.: Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. In: Principles of Distributed Computing, PODC 2003, pp. 172–181 (2003)Google Scholar
  10. 10.
    Wang, H., Ou, Y., Ling, J., Xu, X., Guo, H.: A New Certified Email Protocol. In: 18th International Workshop on Database and Expert Systems Applications, pp. 683–687 (2007)Google Scholar
  11. 11.
    Cederquist, J., Dashti, M.T., Mauw, S.: A Certified Email Protocol Using Key Chains. In: 21st International Conference on Advanced Information Networking and Applications Workshops, pp. 525–530 (2007)Google Scholar
  12. 12.
    Liu, Z., Pang, J., Zhang, C.: Extending a Key-Chain Based Certified Email Protocol with Transparent TTP. In: 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, pp. 630–636 (2010)Google Scholar
  13. 13.
    Jang, J., Nepal, S., Zic, J.: Trusted Email protocol: Dealing with privacy concerns from malicious email intermediaries. In: 8th IEEE International Conference on Computer and Information Technology, pp. 402–408 (2008)Google Scholar
  14. 14.
    Zhang, J., Chen, H.: An improved password-based authenticated email protocol. In: The 2nd IEEE International Conference on Information Management and Engineering, pp. 545–549 (2010)Google Scholar
  15. 15.
    Zhang, J., Chen, H.: An Efficient Identity-Based Authenticated Email Protocol with Perfect Forward Secrecy. In: 2010 International Forum on Information Technology and Applications, pp. 68–71 (2010)Google Scholar
  16. 16.
    Zisiadis, D., Kopsidas, S., Varalis, A., Tassiulas, L.: Mailbook: A social network against spamming. In: 2011 International Conference for Internet Technology and Secured Transactions, pp. 245–249 (2011)Google Scholar
  17. 17.
  18. 18.
    Mathew, A.R., Al Hajj, A., Al Ruqeishi, K.: Cyber crimes: Threats and protection. In: 2010 International Conference on Networking and Information Technology, pp. 16–18 (2010)Google Scholar
  19. 19.
    Zhenhai, D., Peng, C., Sanchez, F., Yingfei, D., Stephenson, M., Barker, J.: Detecting Spam Zombies by Monitoring Outgoing Messages. In: The 28th Conference on Computer Communications, pp. 1764–1772 (2009)Google Scholar
  20. 20.
    Hachem, N., Ben Mustapha, Y., Granadillo, G.G., Debar, H.: Botnets: Lifecycle and Taxonomy. In: 2011 Conference on Network and Information Systems Security, pp. 1–8 (2011)Google Scholar
  21. 21.
    Jung, J., Sit, E.: An Empirical Study of Spam Traffic and the Use of DNS Black Lists. In: 4th ACM SIGCOMM Conference on Internet Measurement, pp. 370–375 (2004)Google Scholar
  22. 22.
    Esquivel, H., Akella, A., Mori, T.: On the Effectiveness of IP Reputation for Spam Filtering. In: 2nd International Conference on Communication Systems and Networks, pp. 1–10 (2010)Google Scholar
  23. 23.
    Sanz, E.P., Hidalgo, J.M.G., Pérez, J.C.C.: Email Spam Filtering. In: Advances in Computers, vol. 74, pp. 45–114 (2008)Google Scholar
  24. 24.
  25. 25.
    The Official CAPTCHA site,
  26. 26.
  27. 27.
  28. 28.
    Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A Bayesian approach to filtering junk e-mail. In: AAAI Workshop on Learning for Text Categorization, pp. 55–62 (1998)Google Scholar
  29. 29.
    Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: P2P-Based Collaborative Spam Detection and Filtering. In: 4th Int. Conference on Peer-to-Peer Computing, pp. 176–183 (2004)Google Scholar

Copyright information

© International Federation for Information Processing 2013

Authors and Affiliations

  • Dimitris Zisiadis
    • 1
  • Spyros Kopsidas
    • 1
  • Leandros Tassiulas
    • 1
  1. 1.University of Thessaly and Centre for Research & Technology HellasVolosGreece

Personalised recommendations