People initially used system like SCADA and PLC's for home,industrial automation purposes and for security applications, but for today's world when people want access and monitoring from remote location, mobile networks can be a good option. This work is for design a low cost system which use a mobile phone (particularly SMS service of GSM)to monitor temperature from a remote location. To achieve the objective a micro controller-based sms module is designed to interface a mobile phone via serial cable to form a wireless temperature monitor system. SMS is used to interact with the mobile phone which in turn interacts with the module. The module connected to a temperature sensor which is used to acquire temperature information, the module sends temperature information to remote user via SMS. Here the module GSM mobile- micro-controller interface system utilized the existing GSM's SMS service with low-cost hardware equipment to create a system for remote monitoring. For communication between mobile and micro-controller here AT commands (specified by Standard GSM 07.05) are used. The system can be monitored via SMS from anywhere that is covered by GSM service.
Reuters Market Light (RML) offers highly customized and localized agricultural and related information service. Using a subscription economy model, RML provides information services via mobile phone-based Short Message Service (SMS) primarily aimed at farmers. RML SMS covers localized weather forecasts, crop advisory, proximate market data and crop prices, and relevant policy and national and international news.
As consumers adopt new communication technologies, advertisers rely less on using traditional media as advertising channels. In recent years, the fast adoption of Short Message Service (SMS) by mobile phone users presents a new interactive medium for advertising. SMS allows advertisers to send text ads directly to consumers via their mobile phones. The ubiquity of the mobile phone extends the traditional media model of time-space. However, little advertising research has been conducted to examine consumers'' attitudes toward SMS advertising. This book provides insights into factors thay may influence consumers'' acceptance of SMS advertising in different cultures. The theoretical model, formulated based on a combination of aspects of Ajzen and Fishbein''s theory of reasoned action with Rogers'' diffusion theory, provides a useful basis for explaining consumer innovation decisions on accepting SMS ads. The analysis helps advertisers understand the usefulness and viability of SMS as an advertising vehicle and how SMS can be included in the promotional mix to achieve more optimal results.
Authentication and encryption are very important factors in GSM system security. This book explains the authentication and encryption scheme used in GSM. It explains the A3, A5 and A8 protocols used in the security mechanism in GSM. It explains the different possible attacks on cellular systems, which include SIM cloning, eavesdropping, location tracking, SMS ping, SMS denial of service, authentication denial of service and SMS spam. It classifies these attacks on the basis of target of the attack, type of attack, motivation and severity. It points out the vulnerabilities that are exploited by attacks on cellular systems. The book also looks into how risk analysis, risk modeling and fuzzy logic can be applied to security in mobile systems. It proposes a fuzzy logic based risk model to secure Short Message Service in GSM based cellular networks. The proposed model uses a hybrid approach towards risk modeling and the model continues to evolve with constant feedback from the user. This approach puts the user in control and allows the model to be refined with time to better match the existing circumstances.
In recent years, cellular networks have witnessed tremendous growth in the use of SMS. In the near future, Multimedia Messaging Service (MMS) is expected to surpass SMS in popularity, traffic, and revenue due to is richer multimedia content such as audio, image and video and greater flexibility. Yet, research in this area has generally been limited, and little is known about the user behavior and system characteristics of mobile messaging. System characteristics based on traces that were collected over the course of three weeks from a nation-wide cellular provider in India that serves over 10 million subscribers. Both message-level and conversation-level messages are characterized, and measurements are presented for person-to-person as well as value-added application-to- person, and person-to-application services. The past decade has witnessed tremendous growth in mobile subscribers, which sequentially has increased awareness of the data capabilities of mobile phones in the market. Although MMS and GPRS based IM are becoming popular, SMS is the most popular data service for cell phones. Today over 200 billion messages are exchanged among worldwide subscribers each month.
Short Message Service (SMS) is widely used to provide communication between users around the world. In the last years, it has become a lucrative way for cybercriminals to infect mobile devices with botnets and launch malicious attacks without the user's knowledge such as: SMS spam and SMS premium rate fraud. SMS spam is one of the dangerous malicious activities as the user is charged for each sent SMS spam. Existing solutions to this issue are no longer adequate as they are either costly in terms of resources, inefficient, or require user intervention with some knowledge on security. In this book, we design, analyze, and implement a system that detects any attempt to send out malicious SMS spams from the mobile device. The proposed system combines the rule-based and the content-based approaches into one detection process. It achieves good performance in terms of detection time and execution cost, and offers a good tradeoff between resilience against attacks and user interaction with the system. This book is intended for multiple audiences: academic, professional, students, and anyone else who is interested in IT security, and particularly in mobile security and botnet detection.
This book describes the method of sending high Quality 2 Dimension,3 Dimension still and animated images over Short Message Service in GSM & Satellite Network. Presented method has two main blocks, first block converts images or animations into characters. And second block applies Huffman coding compression method on those characters and set them as a payload text of SMS. Generally, SMS is text based service and cannot send multimedia contents. For delivering multimedia contents, two other services are utilized which are, MMS (Multimedia Messaging Service) and EMS (Extended Messaging Service). EMS is an application level extension, can transfer predefined sounds, animations and images etc. But a drawback is that EMS is not supported as widely as SMS. On the other hand, MMS have richer contents than SMS and EMS. But for large files it needs higher network capability like 3G etc.
Mobile Banking is an importance aspect of banking system in the modern society because of its novel services. The use of mobile banking increases day by day. Mobile banking includes performing balance checks, account transactions,payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). It is quite impossible for any country to develop industrial and commercial sector without sound banking system in modern economic era. Mobile Banking is one of the significant functions of the bank. It plays a vital role in overall economy of a country. This book revealed that mobile banking systems are easy for modern banking system. The mobile banking that does can be handled all over in remote area within a single moment. Mobile banking through an SMS based service would require the lowest amount of effort, in terms of cost and time. Mobile Application based banking is poised to be a big m-commerce feature in Bangladesh and it could well be the driving factor to increase sales of high-end mobile phones.
Today patient monitoring system along with wireless medical devices is used to monitor patients, but still the patients have to stay inside coverage area of wireless devices. Also, the systems depend on General Packet Radio Service (GPRS) service still face the problem of wireless accessibility versus time and location. This book introduces a trusty patient monitoring system that uses emerging technologies, such as Android OS, to establish a healthcare infrastructure. The system uses GPS technology to track the patients and performs automated steps to reach nearest medical care team to the patient in an emergency case. The communication is based on GPRS, and in case unavailability of GPRS, the system continues fully functional by using encoded SMS over GSM. Also, security is a main concern that has been achieved by using proposed third party based solution and AES encryption scheme. General system designers may benefit from the system security and availability solutions that have been proposed in this book. The healthcare system designers may benefit in specific from different perspective of this book.