Call for Paper

CAE solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 31, 2023.

Read More

Authenticated Wireless Information Display System Using GSM Module

Varun Shukla, Ankit Kushwaha, Shivam Singh Parihar, Shubham Srivastava, Varun Pratap Singh. Published in Information Sciences.

Communications on Applied Electronics
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Varun Shukla, Ankit Kushwaha, Shivam Singh Parihar, Shubham Srivastava, Varun Pratap Singh

Varun Shukla, Ankit Kushwaha, Shivam Singh Parihar, Shubham Srivastava and Varun Pratap Singh. Authenticated Wireless Information Display System using GSM Module. Communications on Applied Electronics 5(3):7-11, June 2016. BibTeX

	author = {Varun Shukla and Ankit Kushwaha and Shivam Singh Parihar and Shubham Srivastava and Varun Pratap Singh},
	title = {Authenticated Wireless Information Display System using GSM Module},
	journal = {Communications on Applied Electronics},
	issue_date = {June 2016},
	volume = {5},
	number = {3},
	month = {Jun},
	year = {2016},
	issn = {2394-4714},
	pages = {7-11},
	numpages = {5},
	url = {},
	doi = {10.5120/cae2016652251},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In the world of data transmission, crowded places like colleges, hospitals, railway stations and various other places are facing the problem of wired notice boards with much complex circuitry which is problematic because one has to present in the office in order to change the information of the notice board. We suggest an authenticated system which can overcome these obstacles. We need to replace all this with a circuit that is prepared with the components like GSM module, a wireless display unit, microcontroller and some other important elements. Here it is important to mention that in a notice board based system authentication is very important which is the major cryptographic goal. Authentication can be achieved by various ways and in this paper we adopt one of the available methods along with the message display system.


  1. D. Balfanz, D.K. Smetters, P. Stewart, and H.C. Wong, “Talking to strangers: authentication in Ad-Hoc wireless networks,” in Proc. Network and Distributed System Security Symposium Conference, 2002.
  2. J.Brandt, I.Damga°ard, P.Landrock and T.Pedersen,Zero-Knowledge Authentication Scheme with Secret Key Exchange, J.Cryptology, vol 11(1998), 147-160.
  3. D Dalwadi, N Trevedi and A Kasundra (Articles in National conference on Recent trends in Engineering and technology), INDIA,2011
  4. L Bollen, Eimler S and Hoppe H.U. “SMS-based Discussions Technology Enhanced Collaboration for a Literature Course”. In Proceedings of the 2nd IEEE International Workshop on Wireless and Mobile Technologies in Education, 24- 27 May 2004, Germany, pp. 1-2, 2004.
  5. B. A. Forouzan, “Cryptography and Network Security”, Special Indian Edition, The McGraw- Hill companies, New Delhi, 2007.
  6. C. Peijiang; Jiang Xuehua, "Design and Implementation of Remote Monitoring System Based on GSM," Computational Intelligence and Industrial Application, 2008. PACIIA '08. Pacific-Asia Workshop on, vol.1, no., pp.678, 681, 19-20 Dec. 2008
  7. Cooperation in wireless networks : principles and applications- FHP Fitzek, MD Katz Springer , ISBN 978-1-4020-4711-4,2006
  8. C.Darshankumar Dalwadi, Ninad Trivedi, Amit Kasundra, “WIRELESS NOTICE BOARD Our RealTime Solution” National Conference on Recent Trends in Engineering & Technology, May13-14, 2011
  9. J.Datta, Chowdhuri, S.; Bera, J., "GSM based condition reporting system for power station equipments," Emerging Applications of Information Technology (EAIT), 2012 Third International Conference on , vol., no., pp.256,259, Nov. 30 2012-Dec. 1 2012
  10. GSM and Personal Communications Handbook- SiegmundRedl - MatthiasWeber- MalcolmW. Oliphant Artech House Publishers, 01 May 1998
  11. GSM Telecommunication standards-, European Telecommunications Standards Institute,April 2000 2nd edition
  12. C. Gehrmann, C.J. Mitchell, and K. Nyberg, “Manual authentication for wireless devices,” RSA Cryptobytes, vol. 7, No. 1, pp. 29-37, 2004.
  13. GuifenGu; GuiliPeng, "The survey of GSM wireless communication system," Computer and Information Application (ICCIA), 2010 International Conference on , vol., no., pp.121,124, 3-5 Dec. 2010
  14. W. Mao, Modern Cryptography: Theory and Practice, Prentice Hall PTR, New Jersey, USA, 2004.
  15. A. J. Menezes, P. C. V. Oorschot, & S. A. Vanstone, “Handbook of Applied Cryptography”, 5th edn., CRC Press Inc., USA, 2001.
  16. Microchip PIC16F72 data sheet , 28 pin 8 Bits CMOS flash microcontroller with A/D converter
  17. M Samiullah, N S Qureshi,” SMS Repository and Control System using GSM SMS technology”, Europen Journal of Scientific Research 2012
  18. V.Shukla,A.Chaturvedi,N.Srivastava,”A new secure authenticated key agreement scheme for wireless (mobile) communication in an EHR system using cryptography”, Communication on applied electronics (CAE), ISSN:2394-4714,volume-3,No-3,Oct-2015,pp 16-21
  19. Jianming Zhu, Sch. of Comput., Xidian Univ., Xi'an, China JianfengMa“IEEE Transactions on Consumer Electronics” (Volume:50 , Issue: 1 )ISSN :0098-3063


Authentication, Security, Wireless Communication, GSM (Global System for Mobile communication), Cryptography