SIMSSP: Secure Instant Messaging System for Smart Phones

  • Kahtan Aziz
  • Saed Tarapiah
  • Shadi AtallaEmail author
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 16)


Hand held smart devices such as smart phones, Personal Digital Assistant (PDAs) and tablets are ubiquitous and touch almost all people’ life functions. In most cases, Hand held devices can be categorized as messaging-centric that conveying information in many form of electronic messages i.e. e-mail, Short Message Service (SMS) and instance messaging (IM). IM software exchange large amount of messages (e.g. plain text, images and files) over insecure communications networks for example wireless and internet communication networks. IM data are transferred through communication networks in different locations. Thus, the potential for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the communication network. The objective of this work is to provide a secure effective platform for encrypting and decrypting IM data. The proposed platform is based on pre-shared secure key mechanism and Vernam algorithm in order to guarantee secure transmission and storage functions for IM applications through a well-established Application Programming Interface (API) that provides seamless integration with existing IM software.


Smartphone Security Instance messaging 


  1. 1.
    Leavitt, N.: Instant messaging: a new target for hackers. Computer 38(7), 20–23 (2005)CrossRefGoogle Scholar
  2. 2.
    Mannan, M., van Oorschot, P.C.: Secure public instant messaging: a survey. In: Proceedings of Privacy, Security and Trust (2004)Google Scholar
  3. 3.
    Kahate, A.: Cryptography and Network Security. Tata McGraw-Hill Education, New Delhi (2013)Google Scholar
  4. 4.
    Laudon, J.P., Laudon, K.C.: Essentials of Management Information Systems, 10th edn. Prentice Hall, Upper Saddle River (2013)zbMATHGoogle Scholar
  5. 5.
    Arifin, A., Mammi, H.K.: Study on the effectiveness of securing instant messaging using one time pad. Int. J. Adv. Soft Comput. Appl. 6(1) (2014)Google Scholar
  6. 6.
    Ollmann, G.: Securing against the "threat" of instant messaging. Netw. Secur. J. 2004(3), 8–11 (2004)CrossRefGoogle Scholar
  7. 7.
    Carey, C.A., Robinson, B.A.: Method and system for instant messaging across cellular networks and a public data network, U.S. Patent No. 6,714,793. 30, March 2004Google Scholar
  8. 8.
    Vernam, G.S.: Cipher printing telegraph systems: for secret wire and radio telegraphic communications. J. AIEE 45(2), 109–115 (1926)Google Scholar
  9. 9.
    Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison Wesley, Boston (2001)Google Scholar
  10. 10.
    Saint-Andre, P.: Extensible messaging and presence protocol. XMPP, Core (2011)Google Scholar
  11. 11.
    Rosenberg, J.: SIMPLE made simple: an overview of the IETF specifications for instant messaging and presence using the session initiation protocol (SIP) (2013)Google Scholar
  12. 12.
    Yang, C.-H., et al.: Design and implementation of a secure instant messaging service based on elliptic-curve cryptography. J. Comput. 18(4), 31–38 (2008)Google Scholar
  13. 13.
    Egan, S., et al.: Pidgin. Accessed Jan 2016
  14. 14.
    Microsoft Corp: C# Language. Accessed Mar 2016
  15. 15.
    Xamarin Corp.: Xamarin: Mobile App Development & App Creation Software. Accessed Mar 2016

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.College of Engineering ComputingAl Ghurair UniversityDubaiUnited Arab Emirates
  2. 2.Telecommunication Engineering DepartmentAn-Najah National UniversityNablusPalestine
  3. 3.College of Information Technology (CIT)University of DubaiDubaiUnited Arab Emirates

Personalised recommendations