Upload
syed-bahauddin-alam
View
221
Download
0
Embed Size (px)
Citation preview
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 1/12
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 309
GSM and ICT Framed E-Governance Incorporated with Network
Protection
Syed Bahauddin Alam, Md. Rashiduzzaman Bulbul
Department of Electrical and Electronic Engineering,
Bangladesh University of Engineering and Technology, Dhaka
ABSTRACT
E-Governance escalation and divine service beginsfrom the easy dissemination and easy access from the
citizen to the govern-mental information, passes
through the electronic transactions between thecitizen and the public organization, and reaches to the
electronic delivery of the requested document by the
public organization to the citizen. An obviousprerequisite, in order to support the ”layers” of the e-
government services is the development of anelectronic infrastructure, which is able to support e-
protocol, e-applications / e-petitions and internal
organizational function of the public organization.Process modeling proved useful since it shows the
process as a whole, the drawbacks of the existingprocess, bottlenecks in carrying out the process and it
provides a critical insight into process execution etc.
The results of the process modeling provide goodfoundations for business process reengineering as the
next step towards e-government. In addressing the
above content, this paper presents an E-Governancestructure which supports and provides the e-
governance services and a practical model of e-governance incorporated with e-business for
transparent and robust administrative strategy.
Index Terms- ICT, E-Governance, GSM, Robust,Watermark, Network Security.
1. INTRODUCTION
The term e-governance focuses on the use of new
information and communication technologies (ICTs)
by governments as applied to the full range of government functions. In particular, the networking
potential offered by the Internet and relatedtechnologies allow the possibility to transform
government structures and operations. E- Governance
is positively related to improved government citizen
relationships and corruption reduction. It initiatives
can make important contributions to improvingpublic services as they can best do so by helping
improve overall relationships between governments
and citizens. It has been conceptualized as the
intensive or generalized use of info-rmation
technologies in government for the provision of public services, the improvement of managerial
effectiv-eness, and the promotion of democratic
values and mecha-nisms. Information technology
(IT) has the potential to transform government
structures and improve the quality of government
services. Technology provides two main
opportunities for government: (1) improved
operational efficiency by reducing costs andincreasing productivity; and (2) better quality
services provided by government agencies. Therefore,
business renovation or business process renovation
methods should be used within the framework of
introducing e-services. Mobile banking scheme used
here is a new commodious scheme for administration
to perform banking transactions with clients and
other institutions without location boundary. The
usages of mobile banking are predicted to increase as
the number of cellular phone users are increasing and
mobile usage are foreseen to revolutionize payment
banking for industries worldwide [1] and it would be
a new horizon in administrative protocol. Robustness
of any administration or corporate office depends on
certain criterions. If these criterions can be fully
managed by the authority, then the administration can
be said to be succeeded in this arena. The conditions
of well conductive administration are the strictness of
time management, well organized office activities,
submission of assigned work within deadline,performance appraisal of the stuffs or workers, time
IJMAN
Journal homepage: www.ifrsa.org
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 2/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 310
utilization by stuffs, file management database,
attendance database, perfect monitoring to the stuffs,
safety transaction protocol [2] between banking
sectors and administration and finally at the time of
survey or any ground work, online viability checking
of the data. By implementing all these conditions to
an administrative arena, then these must be a combatagainst the all kinds of corruption. But for
implementing these all, there need software and
online web browser associated with tracking devices,
webcam and sensors embedded instruments. In the
case of highly developed and developed countries,
implementation of this technology is not at all a big
deal, but in the case of developing and least
developed countries (LDCs), it will be difficult for
them to change their existing infrastructure for
implementing this technology. So, it must be
implemented in the existing infrastructure of the
developing countries as they can easily apply and
implement this in a very comfortable manner. From
the next section, implementations of comprehensive
IT based soluti-on for a robust and transparent
administrative protocol will be explained. Common
forms of corruption are bribery, extortion, influence
peddling, nepotism, fraud, and oppor-tunism. The
main drivers of corruption to be economic, political,
and cultural factors, which vary from country to
country. The drivers of corruptions are : (i) monopoly
of power; (ii) discretion; and (iii) lack of
accountability and transparency. It is useful to
distinguish between types of corruption and to
identify those which e-Governance can most readilyfight. The first group of corrupt practices is petty
bureaucratic corruption (i.e. low-level administrative
corruption). The second group of corrupt activitiesconsists of strategies aimed at self-serving asset
stripping by state officials (State capture). The third
group of corrupt activities consists of large politicalcorruption (grand corruption. It is suggested that all
types of petty bureaucratic corruption can be
diminished through the increased transparencyachieved by using modern electronic media.
Generally, employment of the Internet minimizes theopportunities for public officials to monopolize
access to relevant information and to extract bribesfrom their clients. E-Governance is defined as the
application of electronic means to improve the
interac-tions between government and citizens andgovernment and business as well as to employ
electronic means in internal government operations to
simplify and improve democratic government andbusiness aspects of government with the primary goal
of boosting administrative efficiency [3]. Many
developing countries are now realizing the need for
e-governance in order to provide customer-focused,
cost effective, and easy to use services for citizens
and businesses and to improve the internal workings
of government [4] and this paper discusses about the
robust administration protocol.
2. IT BASED SOLUTIONS AND
AUTOMATION FOR A ROBUST
ADMINISTRATION
A. Time Management and Time Utilization by
Stuffs
For maintaining a robust administration, time
scheduling and time management are of grave
importance and the first condition. In the mostgovernment office, time is not maintained strictly.
Delay in the office is a very normal incident in
government office and hence this administrative
protocol cannot be robust enough. So, for a strict
manage-ment of time, an embedded system can be
implemented in the office. This proposed system is as
follows: In the entrance of the office, there will be a
couple of IR sensors located at the middle of the twosides of the door and a timer incorporated with those
sensors. Every stuff should have pass card along with
the unique pin number for opening the door and this
pass card is basically for resist the intruders from the
office. When any stuff will pass the door, then the
time of the entrance will be taken by the timer for a
specific pass card and pin number. The same system
is also applicable at the end of the everydays office.
There should have a database of the entrance anddeparture time of all the stuffs. By embedding this
system time management can be done in a rigorous
manner. In Figure 1: Entrance protocol for time
management has been shown.
Fig. 1. Entrance Protocol
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 3/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 311
Fig. 2. LAN connection in the various sectors of
the company
B. Well Organized Administrative Activities
Second condition of any administrative robustness
depends on well organization of the office activity.
For well organization, File Management is an
important criteria and there needs Local AreaNetwork (LAN) connection in the office among the
stuffs. This can be implemented via a central server.
Assuming, the head of the office can be connected
with 4/5 stuffs by maintaining chain of command and
under the supervision of these stuffs all other junior
stuffs are distributed based on their section. Hence,
file may be shared via LAN in a very swift manner
and at the time of assigning work, deadline should be
mentioned. Here an important factor is that,
comparatively senior stuffs often give their assigned
work to the junior stuff and by that practice,
equilibrium of the office organization is hampered
seriously. So, LAN design may be such that, in aparticular section, comparatively junior stuffs and
senior stuffs are connected themselves via LAN, but
no LAN linkage between senior portion and junior
portion for maintaining transparency of the assigned
job. By implementing this scheme, well distribution
of the assigned work can be managed in a robust way.
In Figure 2: LAN connection in the various sectors of the company has been shown for well management of
file sharing and management.
C. Submission of Assigned Work within Deadline
and Perfect Monitoring To the Stuffs
For a rigid administration, monitoring the stuffs is
important. This can be done as follows: there should
be a video camera in the room of the head admin and
there may be web-cams on the edges of the officesectors as the admin can monitor the stuffs environs.
If any fault is localized, then a warning will be sent to
the section via corresponding supervisor. Byfollowing these, perfect monitoring to the stuffs can
be done. In the developing countries, most corruptionis done by mismanagement of the Companys file.
The distributed job along with the file management
should be submitted to the head of the office via
particulars supervisor through LAN within deadline.
By maintaining these, no Company will suffer for
their file and bribing system can be stopped.
3. ADMINISTRATIVE TRANSACTION
PROTOCOL VIA GSM BASED
CELLULAR COMMUNICATION
For any administrative sector, monetary transaction isone of the most important factors. So, safe monetary
transaction is highly desired by each Company. Safe
transaction protocol between banking sectors and
admin- istration is necessary for the enhancement of
the rigidity of the administrative affairs. Here E-Banking protocol can be implemented for solidifying
the aegis of monetary security and transaction. For
the security of e-banking scheme, SMS banking and
Biometric Information system will be used. In that
case, Voice Verification system will be used as
biometric information and only GSM enabled mobile
set is needed for that transaction. In addition, there
needs two databases and they are Admin databaseand Voice database. The procedure of e-transaction
for any administration is described as follows.
A. Watermarking
There needs collaboration [5] between banking sector
with the government company for having databases
and taking the transaction info and other convenience
only via GSM based mobile phone. It should be
mentioned that, here the concept of SMS Banking
and Voice Verification scheme is used for monetarytransaction and these two will be done only by
GSM/GPRS (edge based) cell phone.
4. ADMIN DATABASE AND VOICE
DATABASE
In a particular bank there must be a database for the
parti-cular company or agency. As cellularcommunication is almost ubiquitous, so by utilizing
this any company or government agency can transact
their monetary dealings. This particular database forany company which will be kept at banking server
is/may be called as Admin Database. Admin
Database is termed as the database of Companiesmonthly or yearly transaction information. On the
other hand, the main goal of using Voice Verificationis to enhance the security in a big sense and for that
confirmation Voice Database is compulsory. Voice
Database can be set up at several places where there
need higher form of security. Firstly, voice database
should be set up at banking server for the case of
withdrawing monetary security. Secondly, there are
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 4/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 312
many restricted arenas in Government Company or
office where this Voice Verification software can be
embedded for the sake of higher security and in this
case there must be set up a Voice Database at the
company or office server. Full process of security and
monetary transaction is described below.
Fig. 3. Cash Transfer between companies
5. SMS PROTOCOL FOR MONETARY
TRANSACTION
For any government company there may be certain
types of transaction. This may be money deposit,
balance transfer between companies, checking recent
transaction and withdrawal of money. In this protocol
balance transfer between companies, checking recent
transaction and withdrawal of money will be shown. A. Cash Transfer between Companies
To transfer balance, the Company has to know the
details of who is transferring the balance to like the
account number and the amount that admin wishes to
send, which is also important in making cash transfer.
The Company has to send a sms in the format shownbelow: *Short Code (For Balance
Transfer)*Companys (Sender) Account No *Re-ceivers Account No*Transferred Amount*Companys
Pin Code Assigned from bank# The software receives
the message checks if the Companys (senders)account details are correct that is the account number
and pin code. If the details for the details for thetransaction are correct, the software does the
crediting of the recipients account and a message that
notifies the sender of the transaction that was made
and the current balance is sent to the sender, which is
below. Amount [****] has been transferred from
your account no [****] to the Account number [***]successfully. Another sms will go to the receivers
mobile that is: Amount [xxxx] has been transferred toyour account no [****] from the Account number
[****] successfully.
B. Withdrawal of Cash From Bank AccountIf any Company wants to withdraw cash from
account, it has to send a sms in this format *ShortCode (For Cash Withdrawal) * Account No*
PIN*Amount*Branch Code # After that, mobile
server will give the Company a feedback to its admin
mobile, comprises of a security code corresponding
to companys desired amount. The Company will get
the sms in the format below: Respected Company,
your Account No: [****] Amount: [****] Security
code [****] After getting this security code for thatspecific amount Company/bearer can withdraw cash
if Account No, Amount and Security code for this
amount matched perfectly. If everything matches and
cash withdrawal is complete, then a confirmation
SMS will be sent to the Company. That is: Taka
[****] has been successfully withdrawn from your
Account no. [****]. In Figure 6: Withdrawal of cash
from bank account is shown.
C. Checking Account Balances And Transaction
Reviews
To check account balances or status of the account,
the admin has to send *short code (for balance
checking)* Account number*pin code* branch code#
This module checks if the companys account number
exists and also checks if the pin code sent also exists,
if the pin code corresponds with the account number
sent, the companys account balance is sent to its
GSM phone number which was used to request for
the balance. The admin of the company receives the
message in this format.
Account Balance as at [Date] is [amount] . In Figure
7: Checking account balances and transaction
reviews are shown.
Fig. 4 Withdrawal of cash from Bank Account
Fig. 5 Checking Account balances And
Transaction Reviews
D. Changing Of Pin Code
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 5/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 313
The pin code of an account can be changed if the
admin of the company wishes to change it for the
security purpose. The admin has to send a message in
this format.
CHANGE PIN [accountnumber] [oldpin] [newpin]
*short code (for changing pin) *Account
Number*present pin# The admin is notified of thechange, and he/she receives a message that says Your
Pin code successfully changed.new pin code is
[****]. In format of Figure 8: Changing of pin code
for the admin is shown.
Fig. 6 Changing Pin Code
Fig. 7 Groups of User Level
6. ENVIRONMENTAL CONSTRUCTION OF
THE E-GOVERNMENT AND
ADMINISTRATION
The E-Government environs comprises of threeschemes: A Portal, the e-protocol and e-applications /
e-petitions systems. The final deuce will be
accounted as unitary, since the latter may be studied
as an annex of the e-protocol arrangement. The
governmental organization comprises of six sections
(planning, havoc compensation, housing, protocol,
finances and research). Each department has one
managing director.
A. Portals Surround Tools
The environs include instruments that offer up
tractability and ability contingent on their use. The
conception of these tools are established on web
services, such as discourse assemblies, chitchat,
message box, e-libraries, which are farfung in the
public web community of interests. These tools aredifferentiated in two groups: informatory and
communicating. On one hand, the informatory tools
admit avails related to the information of
governmental functions and their presentation. On the
other hand, the communicating tools admit services
that allow for the communication of dissimilar user
groups. The environment modifies the direction of
these tools consorting to the user groups permission.
More explicitly, the informatory tools are the
following: annunciations, frequently asked questions
(FAQ) and e-libraries. Sever- ally, the
communicating tools are discussion forums, message
boxes, chat and e-requests. Ultimately, it must be
noted that the environment links the tools consorting
to the particular user level permissions. These levels
are studied in the incisions to follow.
B. Groups of user levels
Seven user levels are identified in the environment.
Different affirming tools subsist in each of them.
Relying on the corresponding use, these degrees have
also a dissimilar function: administrator, manager,
director, employee, protocol (employee) and
registered user, civilian or guest. Each of them
interacts with the other through the informatory and
communicating tools related to each level.C. Decision maker Administrator
The executive coordinates and deals the e-
government application via the administration tools.The administrator decides which user level group has
the permission to use the corresponding informatory
and communicating tools. Furthermore, theadministrator/executive can intercommuni-cate with
the rest user levels in order to resolve issues and has
the prerogative of updating the arrangement.Ultimately, the administrator adjudicates about the
formulation, innovation and dissemination of theelectronic content to the citizens. Through and
through user well-disposed and interactive ICT webtools, the administrator authors the governmental
substance.
D. Groups Associated with Manager-Director- Employees
These three user degrees are delineated together, as
they integrate many laws of similarity. The Managingdirector resolves about the formulation, conception
and dispersion of the electronic content. What is
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 6/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 314
more, by the communication tools, the employees
collaborate with the directors, the directors with the
Managing director and the Managing director with
the Decision maker with regard to problems solution
and ideas interchange for the meliorate funct-ionality
of the arrangement. In conclusion, these three user
levels act as a significant and various role in the e-protocol string, as will be depicted afterwards.
E. Protocol Executive
The Protocol Executive is responsible for the e-
protocol scheme. Besides the Informatory and
Communicating Tools, has the power to view, change
(under conditions) and add applications / petitions to
the e-protocol system (Fig. 8). The applications /
petitions are amply categorized and new categories
can be created.
F. Groups Associated with Registered /
Authorized User
The authoritative users have the power to see and
alter particular info involving their account, can view
the advancement of their applications / petitions and
finally can make new applications / petitions, which
are affirmed by the e-application / e-petition scheme.
Fig. 8 Executive or Administration Tools
Fig. 9 Tools Associated with Manager-Director-
Employees Environments
G. Groups Associated with Unauthorized User /
Guest
Unauthorized User / Guests can enter and search the
organization as a way of conglomerating significant
infor-mation. Finally, he/she may be informed about
the news and results via the news program and
calendar service.
7. USER TOOLS AND SERVICES
A. Executive ToolsThe environment provides executive tools that are
branched in two groups as follows: management of
the portal system and management of the e-protocoland e-applications / e-petitions system. Management
of the Portal system incorporates management of theinformatory services and management of the
communicating services (Fig. 8). Management of the
informatory services is an authoritative group, asthrough it the executive has the tractability to handle
the following systems: users, e-library, main menu
description, announcements and frequently asked
questions (FAQ). The environment tools alter the
decision maker to coordinate the informatory content.Correspondingly, the communicating services group
is comprised of interactional forms thru which the
administrator manages: chat, discussion forum andmessage box. Management of the e-protocol and e-
applications / e-petitions system integrates
management of the postulations, their classes and
points in time. The transactions accomplished in each
group concern recovery, introduce and modify of the
representing information. Entirely webrequests/responses are sued through with
interactional and easy figures.Management of the informatory services is an
authori- tative group, as through it the executive has
the tractability to handle the following systems: users,
e-library, main menu description, announcements and
frequently asked questions (FAQ). The environment
tools alter the decision maker to coordinate the
informatory content. Correspondingly, the
communicating services group is comprised of
interactional forms thru which the administrator
manages: chat, discussion forum and message box.
Management of the e-protocol and e-applications / e-petitions system integrates management of the
postulations, their classes and points in time. Thetransactions accomplished in each group concern
recovery, introduce and modify of the representing
information. Entirely web requests/responses are
sued through with interactional and easy figures.
B. Tools Associated with Manager-Director-
Employees Environment
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 7/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 315
The environment tools (Fig. 9) of these user levels
are studied in three groups: Communication,
Informative and General Services. The group of
communication services is the one that enables these
three levels to communicate with the other user levels.
The tools that employ these tasks are: discussion
forum, message box, and chat. The second group of the informative services is consisted of tools that
enable the fast access and management of the
electronic content. This content cannot be accessed
by unauthorized users. The general services group
includes tools that are different for each user level
and play essential role in the e-protocol chain.
Fig. 10 Tools Associated with Manager-Director-
Employees Environments
C. Tools of the Protocol Employee Environment
The environment tools of this user level has
extended tools regarding the e-protocol system. Theprotocol em- ployee has more privileges in the e-
protocol system and also can interact with the e-
petitions system. This level is the starting and ending
point in the e-protocol chain. In figure 4, tools of the
protocol administrator environment is shown.
D. Tools of the Registered - Authorized Users
Environment
The Registered User has the privilege to interact withthe e-Petitions system. He / She can submit an
application to the agency, as long as it is supported
by the system. Moreover has the ability to track the
status of the applications he / she had submitted in
the past. Finally, he / she can view and change someof his account information. In figure 11, tools
associated with registered users environment
administrator is shown.
Fig. 11 Tools Associated with Manager-Director-
Employees Environments
8. NETWORK SECURITY
For network security a watermarking scheme withfast encryption and compression is applied for voice
signal, used in authentication. During this security
system design size of data is maintained small. For
this maintenance a lossless compression algorithm isintroduced [7]. We may also use other lossless [8],[9]or lossy algori-thms [10]. Like other common
lossless [11]-[14] compres-sion systems applied
compression system is also depends on probability of occurrence.
A. Proposed Compression system
In proposed technique PCM signals are compressed.In practical case a signal contains large number of
same valued samples. Suppose samples are taken as
8-bit PCM; value of samples will be -128 to +127
according to 2’s compliment number. The value of a
sample 120 or more is rare. Most of the samplecontains a value, near zero. The values of samples
have normal distribution of variance, σ = 6 to 25;
depending on signal source [15].
Formula of normal distribution is shown in eqn. (1)-
Here,σ
2= variance, μ = median, x = value of a sample.
So a sample having a value 125 is very rare.
According to this equation this probability is 3.7574×10−96 (calculating using Matlab and considering
σ = 6) to 5.9626 ×10−8 (considering σ = 25). In a
signal of 14,001 samples, no sample has value of 125.The value 127 is not so rare because when a sample
have value 127 or more; the value of this sample issaved as 127.
Here, the value 125 is used as identifier of
repetition. Though probability a sample having thisvalue is very rare, this case should be considered. If
any sample has the value 125 the value should be
changed to 126. The value 126 is very close to 125.
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 8/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 316
Energy of signal is proportional to square of
amplitude. So percentage change in energy of signal
due to this change is (1 - 1252/1262) = 1.58% for
only this sample. According to Weber’s law-
equally perceived differences have values
proportional to absolute levels. It’s mathematical
expression is as eqn. (2)
From this law the following equation (eqn. (3) )is
derived-
Here,
r = response, s = stimulus, k = constant.For this intensity of signal is measured in db (decidel)
and signals are compressed by µ-law or A-law before
sampling.
When the signal is previously compressed by µ-law
or A- law, change in response of signal will be (126 -
125)/125 = 0.8% When the signal is not compressed
by µ-law or A-law, change in response of signal will
be very small. Assuming 20 consecutive samples hasthe value 0 and to represent it 3 consecutive samples
are needed. They are-
s1 = 0 //value of samples2 = 125 //identifier of repetition and s3 = 19.
//number of repetitionHere, s3 is an unsigned 8-bit integer; may hold value
0 to 255.
Fig. 12. Flowchart of proposed compression
system
Fig. 13. Flowchart for changing value of sample,
when any sample contains value 125Problem may arise when number of repetition is
more than 255. Assuming 540 consecutive sampleshas the value 0 and to represent it 5 consecutive
samples are needed. They are-
s1 = 0 //value of sample
s2 = 125 //identifier of repetition
s3 = 255s4 = 255
s5 = 29
From the values of samples, number of repetition is255 +255 + 29 = 539
When number of repetition is 255, then s3 = 255 and
s4 = 0. s3 = 255 means repetition continues to s4 ands4 = 255 means repetition continues to s5 etc.
For 16 or 32 bit PCM data we will use (2N−3) asidentifier of repetition. If this number exists in
sample value will be changed by adding 1.
Fig. 15 shows the flowchart of proposed compressionsystem. Fig. 16 shows how problem of having 125
valued samples is shown.
B. Proposed Watermark with fast encryption
Scheme
In compression system blank spaces are created. Aspeech signal contains 8000 samples per second and
10-60% of it is compressed in proposed compression
system. Watermarks are added repeatedly in blank spaces. 10-60% of 8 kilobyte data is huge location for
information. Watermark information will be usersname, id, network, location, IP address, Mac address,
position etc. Watermarks are added repeatedly for
overcoming watermark attacks- such as copy-pasteattack. In copy-paste attack of a part of signal is cut
or second half of voice signal is sent to receiver so
that watermark information is eliminated. When weare watermarking repeatedly copy-paste attack will
no longer applicable for this. Encryption is used withwatermark for providing top level security.
The root of the word encryption — crypt — comes
from the Greek word kryptos, meaning hidden orsecret. In its earliest form, people have been
attempting to conceal certain information that theywanted to keep to their own possession by
substituting parts of the information with symbols,
numbers and pictures, this paper highlights in
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 9/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 317
chronology the history of Cryptography throughout
centuries [16-20].
The rapid progress in wireless communication
systems such as- mobile systems, and smart card
technology in our society makes information more
vulnerable to abuse. In a communication system,
the content of the communication may be exposed toan eavesdropper. For these reasons, it is important
to make information systems secure by protecting
data and resources from malicious acts. Crypto
(cryptography) algorithms are the core of such
security systems, offering security services of data
privacy, data integrity, authenticity and non-
repudiation [21].
Cryptography plays an important role in the security
of data transmission. The Advanced Encryption
Standard Algorithm [22-24] (AES) is used as the
most trustworthy and commonly used algorithm for
encrypting data. But it is not a fast method in
execution. In Recofigurable Implementation for the
AES Algorithm encryption process is performed in
nine rounds. Here we are proposing simpler. In this
method the size of encrypted data is not large. In
implementation method of AES algorithm [25] no
random variable is used. In Elliptic Curve Digital
Signature Algorithm [26] (ECDSA) random variable
is used, but ECDSA encryption process is very
complex and lengthy one. In Data Encryption
Standard [27] (DES) a 64 bit key is generated. Data is
decrypted using this key. This is not a fast process
and size of encrypted data is not small. Brute-force
Attack can break DES algorithm. In CAVE [28]algorithm execution is not fast, in this algorithm key
is generated; key is not too large. So it may be
decrypted by finding key using input combinationeasily.
In proposed encryption technique a random 9th
bit is
declared for each sample. This extra bit is insertedafter compression and addition of watermarks.
D. Security Testing
Network security is verified using Matlab Software.Fig. 14 shows a part of voice signal.
Fig. 14. Original signal
Fig. 15 shows compression and creation of space for
watermark. Slight difference exists between flow
chart of Fig. 12 and this result. In Fig. 12 repeated
samples are escaped without changing. In following
figure compressed samples are made -125 or better
understanding. Before that an identifier of
notification and number of repetition exists. Numberof repetition is an unsigned 8-bit integer having value
0 to 255. Other samples have value -128 to 127.
Fig. 15. Compressing and creating space for
watermark where sample value - 125 represents
space for watermarkFig. 16 shows position of watermarks or spaces
created for inserting watermark repeatedly.
Fig. 16. Watermark in the created pace Fig. 17 shows compressed and watermarked signal.
Fig. 17. Compressed signal with watermark
Fig. 18 shows the Encrypted signal of the original
signal. Encrypted samples have values from 0 to 511,
as 9th
bit random number is inserted beforeencryption. We will get same signal as Fig. 17 after
decryption, as encryption is lossless. Aftereliminating watermark from signal and signal
reconstruction we will get signal of Fig. 15.
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 10/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 318
Fig. 18. Encrypted signal of the original signal
of Fig. 14
9. E-GOVERNMENT OPPORTUNITIES
A. Quality of Service Delivery to Businesses and
Customers
In the conventional model of public service delivery,
the processes, procedures and operations are banally
time consuming, long and lack transparency.
A business that wishes to obtain a license or a permit
has to fill out a number of application forms, has to
visit a number of different offices and spend aconsiderable amount of time.
If a citizen wishes to be issued with a certificate or
any other official document, he or she will have totravel to the central government office, go to different
offices and spend a lot of time for a simple service.
The consequences are high costs and citizen andbusi- ness dissatisfaction. An e-Government initiative,
on the other hand, which puts government services
online, thereby reducing the bureaucracy, offers
round the clock accessibility, fast and convenient
transactions, and obviously enhances the qual- ity of services, in terms of time, content and accessibility.
Example: In Bahia, Brazil, Citizen Assistance
Service Centres have been created offering over 500separate services.
These centres are placed in shopping malls or otherpublic places, and people going to shop can
simultane- ously apply for different public services
such as getting an identification card, looking for anew job, getting a passport, and checking on their
retirement eligibility. Customer satisfaction studies
revealed that over 89of citizens evaluated the service
centers as excellent. Thus, the quality of services is
ensured by the reduced time that users spend on
getting official documents, waiting and queuing toget documents, travelling, as well as more
customized products and services, error freedocuments and 24*7*365 accessibility.
B. Transparency, Anti-corruption and Accountability
E-Government helps to increase the transparency of
decision-making processes. In many cases e-Government offers opportunities for citizens to
directly participate in decision-making, by allowing
them to provide their own ideas and suggestions in
forums and on- line communities. If web sites are
designed carefully and openly, they can be valuable
resources for transparency as citizens, businesses and
other stakeholders should be able to see political and
governmental information, rules and policies.Previously it was often necessary to go directly to
governmental offices to obtain information, but now
this information should be available on the web. The
availability of a diversity of publications regarding
the activities of the public administration, as well as
economic and legislative aspects, increases the
transparency too. Example: The Central Vigilance
Commission (CVC) in India started an initiative to
create a website with the objective of reducing
corruption and increasing transparency by sharing a
large amount of information related to corruption
with citizens. The CVC website communicates
directly with the public through messages and
speeches to bolster confidence in the institution,
informs the public about its efforts in fighting
corruption, and makes public the names of officers
from the elite administrative and revenue services
against whom investigations have been ordered or
penalties imposed for corruption. Members of the
public are highly encouraged (mainly by rewards) to
make their complaints and to provide information
against a public servant about taking of bribes in
order for the commission to undertake the necessary
anticorruption actions to eliminate bribery and to
increase the transparency of rules, procedures andservice delivery.
10. CONCLUSIONS
In this paper, we presented an e-government envi-
ronment based on ICT tools. Our contribution is
based on the proposal of a generic electronic schemethat enables distant collaboration of the agencies
employees and the e-citizen. The included tools servecommunicational and informative governmental
functions through a user-friendly, interoperable and
distributed web-based architecture. Summing up, wemust note that two basic axes are served. The first is
the communication of the employees and the e-citizen, 24 hours per day, and the e-content
development for different user levels. The second axe
includes the delivery of e-services to the citizen. Byimplementing these system proposed in this paper,
there will create a sound administration, where
transparency and security of authority is guaranteed.This model of E-Governance must be Pragmatic in
manner for Transparent and Robust Administrative
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 11/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 319
Protocol whenever it is Integrated and merged with
E-Business.
ACKNOWLEDGEMENT
Authors would like to thank Bangladesh University
of Engineering & Technology for providing facilities
to conduct the research.
REFERENCES
[1] Herzberg, A. Payments and banking with mobile
personal devices, Communications of the ACM,
Wireless networking security, Vol. 46, Pages:53,
Issue 5, May 2003.
[2] Lord, S. Trouble at Telco: When GSM Goes Bad.
Network Security, Issue 1, Page 10 -12, 2003.
[3] Michiel Backus, E-Governance and Developing
Countries: Introduction and Examples, Research
Report, International Institute for
Communication and Development (IICD), No. 3,
April 2001.[4] Farooq Sobhan, M. Shafiullah, Zahid Hossain,
Mridul Chowdhury. Study of e-Government in
Bangladesh, Research Report, Bangladesh
Enterprise Institute, Bangladesh, April 2004.
[5] Kelvin Chikomo and Ming Ki Chong ,
Supervisor: Alapan Arnab, Andrew Hutchison.
Security of mobile banking Project proposal ,
Data Network Architecture Group ,2005
[6] (2008) The Biometric Group website. [Online],
Available in http:// www.biometricgroup.com/
[7] M. D. Kabir, S. Bahauddin et al., “A Theory of
Loss-less Compression of High Quality Speech
Signals with Comparison,” in UKSim Fourth European Modelling Symposium on Computer
Modelling and Simulation (EMS 2010), pp. 136-
141, 17-19 Nov. 2010.
[8] T. Liebchen, T. Moriya, N. Harada, Y.
Kamamoto, and Y. A. Reznik, “The MPEG-4
Audio Lossless Coding (ALS)Standard -
Technology and Applications,” in 119th
Convention, 2005 October 710 New York, NY,
USA
[9] T. Liebchen, “MPEG-4ALS -The Standard for
Lossless Audio Coding” in The Journal of the
Acoustical Society of Korea, vol. 28, no. 7,
October 2009.[10] M. D. Kabir, S. Bahauddin et al., “Non-linear
Down-sampling and Signal Reconstruction,
Without Folding,” in UKSim Fourth European
Modelling Symposium on Computer Modelling
and Simulation (EMS 2010), pp. 142-146, 17-19
Nov. 2010.
[11] Giria; B. M. Raob; S. Chattopadhyaya, “Split
Variable-length Input Huffman Code With
Application to Test Data Compression for
Embedded Cores in SOCs ,” in International
Journal of Electronics, Vol. 96, Issue 9, pp 935
- 942, September 2009.
[12] FLAC open-source audio compression
program, Available in-
http://flac.sourceforge.net
[13] What is TTA?, Available in-http://www.coolutils.com/Formats/TTA
[14] Stuart, P. Craven, M. Gerzon, M. Law, R.
Wilson, ”MLP l ossless Compression” in AES
9th Regional Convention, Tokyo, 23-25 June,
2009.
[15] R. E. Walpole, R. H. Myers, Probability &
Statistics for Engineers and Scientists, 2nd ed.
[16] Bacon: Sir Francis Bacon, ``De Augmentis
Scientarum'', Book 6, Chapter i. [as quoted in C.
Stopes, ``Bacon-Shakspere Question'', 1889
[17] http://all.net/books/ip/Chap2-1.html
[18] http://www.wakecomp.com/josh/history.html
[19] http://www.cybercrimes.net/Cryptography/Articl
es/Hebert.html
[20] http://www.massconfusion.com/crypto/Lecture/i
ntro2.shtm
[21] P. C. van Oorschot, Alfred J. Menezes, and Scott
A. Vanstone, 1996. "Handbook of Applied
Cryptography." CRC press Inc., Florida
[22] X. Zhang and K. K. Parhi "Implementation
Approaches for the AES Algorithm" 2004; IEEE
Educational Activities Department, NJ USA
[23] R. Ashruf, G. Gaydadjiev, S. Vassiliadis
"Reconfigurable Implementation for the AES
Algorithm" 2002
[24] P. Su, T. F. Lin, C. T. Huang, and C. W. Wu "A
High-Throughput Low Cost AES Processor" ,National Tsing Hua University 2003
[25] M. K. Hani, H. Y. Wen, A. Paniandi. "An
Implementation Of Elliptic Curve Digital
Signature Algorithm In FPGA-Based Embedded
System For Next Generation IT Security"
Penang 20-22 July 2005 The International
Conference on Robotics, Vision, Information and
signal processing
[26] M. E. Smid & D. K. Branstad "The Data
Encryption Standard Past and Future" ; National
Institute of Standards and Technology
[27] Elbaz & H. Bar-El "Strength Assessment Of
Encryption Algorithms" Discretix TechnologiesLtd.
[28] W. Millan, P. Gauravaram, "Cryptanalysis of
cellular authentication and voice encryption
algorithm" Information Security Research
Centre; Queensland University of Technology
(Modified last in 2009)
Syed Bahauddin Alam has taken his baccalaureate
degree from Electrical & Electronics Engineering (EEE)
at Bangladesh University of Engineering and
8/3/2019 GSM and ICT
http://slidepdf.com/reader/full/gsm-and-ict 12/12
S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection
International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 320
Technology (BUET) at 2011. He has passed Secondary
School Certificate (SSC) at 2003 and Higher Secondary
School Certificate (HSC) at 2005 from Faujdarhat Cadet
College (FCC). His interests are Signal Processing,
Security of GSM Technology, Particle physics,
Electromagnetic Shielding, Atomic property analysis
and simulation, Bremsstrahlung and radiation physics,
analysis of confinement times, time utilization factor,
Poisoning effect of Xenon and samarium and 3-D
Compton Imaging. He has published International
research paper based on Nuclear Energy and Physics for
the very first time from Bangladesh. As well as, he has
published highest numbers of International research
papers at undergraduate level in Bangladesh.