12
8/3/2019 GSM and ICT http://slidepdf.com/reader/full/gsm-and-ict 1/12 International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 309 GSM and ICT Framed E-Governance Incorporated with Network Protection Syed Bahauddin Alam, Md. Rashiduzzaman Bulbul Department of Electrical and Electronic Engineering, Bangladesh University of Engineering and Technology, Dhaka ABSTRACT E-Governance escalation and divine service begins from the easy dissemination and easy access from the citizen to the govern-mental information, passes through the electronic transactions between the citizen and the public organization, and reaches to the electronic delivery of the requested document by the public organization to the citizen. An obvious prerequisite, in order to support the ”layers” of the e- government services is the development of an electronic infrastructure, which is able to support e- protocol, e-applications / e-petitions and internal organizational function of the public organization. Process modeling proved useful since it shows the process as a whole, the drawbacks of the existing process, bottlenecks in carrying out the process and it provides a critical insight into process execution etc. The results of the process modeling provide good foundations for business process reengineering as the next step towards e-government. In addressing the above content, this paper presents an E-Governance structure which supports and provides the e- governance services and a practical model of e- governance incorporated with e-business for transparent and robust administrative strategy. Index Terms- ICT, E-Governance, GSM, Robust, Watermark, Network Security. 1. INTRODUCTION The term e-governance focuses on the use of new information and communication technologies (ICTs) by governments as applied to the full range of government functions. In particular, the networking potential offered by the Internet and related technologies allow the possibility to transform government structures and operations. E- Governance is positively related to improved government citizen relationships and corruption reduction. It initiatives can make important contributions to improving public services as they can best do so by helping improve overall relationships between governments and citizens. It has been conceptualized as the intensive or generalized use of info-rmation technologies in government for the provision of public services, the improvement of managerial effectiv-eness, and the promotion of democratic values and mecha-nisms. Information technology (IT) has the potential to transform government structures and improve the quality of government services. Technology provides two main opportunities for government: (1) improved operational efficiency by reducing costs and increasing productivity; and (2) better quality services provided by government agencies. Therefore, business renovation or business process renovation methods should be used within the framework of introducing e-services. Mobile banking scheme used here is a new commodious scheme for administration to perform banking transactions with clients and other institutions without location boundary. The usages of mobile banking are predicted to increase as the number of cellular phone users are increasing and mobile usage are foreseen to revolutionize payment banking for industries worldwide [1] and it would be a new horizon in administrative protocol. Robustness of any administration or corporate office depends on certain criterions. If these criterions can be fully managed by the authority, then the administration can be said to be succeeded in this arena. The conditions of well conductive administration are the strictness of time management, well organized office activities, submission of assigned work within deadline, performance appraisal of the stuffs or workers, time IJMAN Journal homepage: www.ifrsa.org

GSM and ICT

Embed Size (px)

Citation preview

Page 1: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 1/12

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 309 

GSM and ICT Framed E-Governance Incorporated with Network

Protection

Syed Bahauddin Alam, Md. Rashiduzzaman Bulbul

Department of Electrical and Electronic Engineering,

Bangladesh University of Engineering and Technology, Dhaka

ABSTRACT

E-Governance escalation and divine service beginsfrom the easy dissemination and easy access from the

citizen to the govern-mental information, passes

through the electronic transactions between thecitizen and the public organization, and reaches to the

electronic delivery of the requested document by the

public organization to the citizen. An obviousprerequisite, in order to support the ”layers” of the e-

government services is the development of anelectronic infrastructure, which is able to support e-

protocol, e-applications / e-petitions and internal

organizational function of the public organization.Process modeling proved useful since it shows the

process as a whole, the drawbacks of the existingprocess, bottlenecks in carrying out the process and it

provides a critical insight into process execution etc.

The results of the process modeling provide goodfoundations for business process reengineering as the

next step towards e-government. In addressing the

above content, this paper presents an E-Governancestructure which supports and provides the e-

governance services and a practical model of e-governance incorporated with e-business for

transparent and robust administrative strategy.

Index Terms- ICT, E-Governance, GSM, Robust,Watermark, Network Security.

1.  INTRODUCTION

The term e-governance focuses on the use of new

information and communication technologies (ICTs)

by governments as applied to the full range of government functions. In particular, the networking

potential offered by the Internet and relatedtechnologies allow the possibility to transform

government structures and operations. E- Governance

is positively related to improved government citizen

relationships and corruption reduction. It initiatives

can make important contributions to improvingpublic services as they can best do so by helping

improve overall relationships between governments

and citizens. It has been conceptualized as the

intensive or generalized use of info-rmation

technologies in government for the provision of public services, the improvement of managerial

effectiv-eness, and the promotion of democratic

values and mecha-nisms. Information technology

(IT) has the potential to transform government

structures and improve the quality of government

services. Technology provides two main

opportunities for government: (1) improved

operational efficiency by reducing costs andincreasing productivity; and (2) better quality

services provided by government agencies. Therefore,

business renovation or business process renovation

methods should be used within the framework of 

introducing e-services. Mobile banking scheme used

here is a new commodious scheme for administration

to perform banking transactions with clients and

other institutions without location boundary. The

usages of mobile banking are predicted to increase as

the number of cellular phone users are increasing and

mobile usage are foreseen to revolutionize payment

banking for industries worldwide [1] and it would be

a new horizon in administrative protocol. Robustness

of any administration or corporate office depends on

certain criterions. If these criterions can be fully

managed by the authority, then the administration can

be said to be succeeded in this arena. The conditions

of well conductive administration are the strictness of 

time management, well organized office activities,

submission of assigned work within deadline,performance appraisal of the stuffs or workers, time

IJMAN

Journal homepage: www.ifrsa.org

Page 2: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 2/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 310 

utilization by stuffs, file management database,

attendance database, perfect monitoring to the stuffs,

safety transaction protocol [2] between banking

sectors and administration and finally at the time of 

survey or any ground work, online viability checking

of the data. By implementing all these conditions to

an administrative arena, then these must be a combatagainst the all kinds of corruption. But for

implementing these all, there need software and

online web browser associated with tracking devices,

webcam and sensors embedded instruments. In the

case of highly developed and developed countries,

implementation of this technology is not at all a big

deal, but in the case of developing and least

developed countries (LDCs), it will be difficult for

them to change their existing infrastructure for

implementing this technology. So, it must be

implemented in the existing infrastructure of the

developing countries as they can easily apply and

implement this in a very comfortable manner. From

the next section, implementations of comprehensive

IT based soluti-on for a robust and transparent

administrative protocol will be explained. Common

forms of corruption are bribery, extortion, influence

peddling, nepotism, fraud, and oppor-tunism. The

main drivers of corruption to be economic, political,

and cultural factors, which vary from country to

country. The drivers of corruptions are : (i) monopoly

of power; (ii) discretion; and (iii) lack of 

accountability and transparency. It is useful to

distinguish between types of corruption and to

identify those which e-Governance can most readilyfight. The first group of corrupt practices is petty

bureaucratic corruption (i.e. low-level administrative

corruption). The second group of corrupt activitiesconsists of strategies aimed at self-serving asset

stripping by state officials (State capture). The third

group of corrupt activities consists of large politicalcorruption (grand corruption. It is suggested that all

types of petty bureaucratic corruption can be

diminished through the increased transparencyachieved by using modern electronic media.

Generally, employment of the Internet minimizes theopportunities for public officials to monopolize

access to relevant information and to extract bribesfrom their clients. E-Governance is defined as the

application of electronic means to improve the

interac-tions between government and citizens andgovernment and business as well as to employ

electronic means in internal government operations to

simplify and improve democratic government andbusiness aspects of government with the primary goal

of boosting administrative efficiency [3]. Many

developing countries are now realizing the need for

e-governance in order to provide customer-focused,

cost effective, and easy to use services for citizens

and businesses and to improve the internal workings

of government [4] and this paper discusses about the

robust administration protocol.

2.  IT BASED SOLUTIONS AND

AUTOMATION FOR A ROBUST

ADMINISTRATION

 A.  Time Management and Time Utilization by

Stuffs

For maintaining a robust administration, time

scheduling and time management are of grave

importance and the first condition. In the mostgovernment office, time is not maintained strictly.

Delay in the office is a very normal incident in

government office and hence this administrative

protocol cannot be robust enough. So, for a strict

manage-ment of time, an embedded system can be

implemented in the office. This proposed system is as

follows: In the entrance of the office, there will be a

couple of IR sensors located at the middle of the twosides of the door and a timer incorporated with those

sensors. Every stuff should have pass card along with

the unique pin number for opening the door and this

pass card is basically for resist the intruders from the

office. When any stuff will pass the door, then the

time of the entrance will be taken by the timer for a

specific pass card and pin number. The same system

is also applicable at the end of the everydays office.

There should have a database of the entrance anddeparture time of all the stuffs. By embedding this

system time management can be done in a rigorous

manner. In Figure 1: Entrance protocol for time

management has been shown.

Fig. 1. Entrance Protocol

Page 3: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 3/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 311 

Fig. 2. LAN connection in the various sectors of 

the company

 B.  Well Organized Administrative Activities

Second condition of any administrative robustness

depends on well organization of the office activity.

For well organization, File Management is an

important criteria and there needs Local AreaNetwork (LAN) connection in the office among the

stuffs. This can be implemented via a central server.

Assuming, the head of the office can be connected

with 4/5 stuffs by maintaining chain of command and

under the supervision of these stuffs all other junior

stuffs are distributed based on their section. Hence,

file may be shared via LAN in a very swift manner

and at the time of assigning work, deadline should be

mentioned. Here an important factor is that,

comparatively senior stuffs often give their assigned

work to the junior stuff and by that practice,

equilibrium of the office organization is hampered

seriously. So, LAN design may be such that, in aparticular section, comparatively junior stuffs and

senior stuffs are connected themselves via LAN, but

no LAN linkage between senior portion and junior

portion for maintaining transparency of the assigned

 job. By implementing this scheme, well distribution

of the assigned work can be managed in a robust way.

In Figure 2: LAN connection in the various sectors of the company has been shown for well management of 

file sharing and management.

C.  Submission of Assigned Work within Deadline

 and Perfect Monitoring To the Stuffs

For a rigid administration, monitoring the stuffs is

important. This can be done as follows: there should

be a video camera in the room of the head admin and

there may be web-cams on the edges of the officesectors as the admin can monitor the stuffs environs.

If any fault is localized, then a warning will be sent to

the section via corresponding supervisor. Byfollowing these, perfect monitoring to the stuffs can

be done. In the developing countries, most corruptionis done by mismanagement of the Companys file.

The distributed job along with the file management

should be submitted to the head of the office via

particulars supervisor through LAN within deadline.

By maintaining these, no Company will suffer for

their file and bribing system can be stopped.

3.  ADMINISTRATIVE TRANSACTION

PROTOCOL VIA GSM BASED

CELLULAR COMMUNICATION

For any administrative sector, monetary transaction isone of the most important factors. So, safe monetary

transaction is highly desired by each Company. Safe

transaction protocol between banking sectors and

admin- istration is necessary for the enhancement of 

the rigidity of the administrative affairs. Here E-Banking protocol can be implemented for solidifying

the aegis of monetary security and transaction. For

the security of e-banking scheme, SMS banking and

Biometric Information system will be used. In that

case, Voice Verification system will be used as

biometric information and only GSM enabled mobile

set is needed for that transaction. In addition, there

needs two databases and they are Admin databaseand Voice database. The procedure of e-transaction

for any administration is described as follows.

 A.  Watermarking

There needs collaboration [5] between banking sector

with the government company for having databases

and taking the transaction info and other convenience

only via GSM based mobile phone. It should be

mentioned that, here the concept of SMS Banking

and Voice Verification scheme is used for monetarytransaction and these two will be done only by

GSM/GPRS (edge based) cell phone.

4.  ADMIN DATABASE AND VOICE

DATABASE

In a particular bank there must be a database for the

parti-cular company or agency. As cellularcommunication is almost ubiquitous, so by utilizing

this any company or government agency can transact

their monetary dealings. This particular database forany company which will be kept at banking server

is/may be called as Admin Database. Admin

Database is termed as the database of Companiesmonthly or yearly transaction information. On the

other hand, the main goal of using Voice Verificationis to enhance the security in a big sense and for that

confirmation Voice Database is compulsory. Voice

Database can be set up at several places where there

need higher form of security. Firstly, voice database

should be set up at banking server for the case of 

withdrawing monetary security. Secondly, there are

Page 4: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 4/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 312 

many restricted arenas in Government Company or

office where this Voice Verification software can be

embedded for the sake of higher security and in this

case there must be set up a Voice Database at the

company or office server. Full process of security and

monetary transaction is described below.

Fig. 3. Cash Transfer between companies

5.  SMS PROTOCOL FOR MONETARY

TRANSACTION

For any government company there may be certain

types of transaction. This may be money deposit,

balance transfer between companies, checking recent

transaction and withdrawal of money. In this protocol

balance transfer between companies, checking recent

transaction and withdrawal of money will be shown. A.  Cash Transfer between Companies

To transfer balance, the Company has to know the

details of who is transferring the balance to like the

account number and the amount that admin wishes to

send, which is also important in making cash transfer.

The Company has to send a sms in the format shownbelow: *Short Code (For Balance

Transfer)*Companys (Sender) Account No *Re-ceivers Account No*Transferred Amount*Companys

Pin Code Assigned from bank# The software receives

the message checks if the Companys (senders)account details are correct that is the account number

and pin code. If the details for the details for thetransaction are correct, the software does the

crediting of the recipients account and a message that

notifies the sender of the transaction that was made

and the current balance is sent to the sender, which is

below. Amount [****] has been transferred from

your account no [****] to the Account number [***]successfully. Another sms will go to the receivers

mobile that is: Amount [xxxx] has been transferred toyour account no [****] from the Account number

[****] successfully.

 B.  Withdrawal of Cash From Bank AccountIf any Company wants to withdraw cash from

account, it has to send a sms in this format *ShortCode (For Cash Withdrawal) * Account No*

PIN*Amount*Branch Code # After that, mobile

server will give the Company a feedback to its admin

mobile, comprises of a security code corresponding

to companys desired amount. The Company will get

the sms in the format below: Respected Company,

your Account No: [****] Amount: [****] Security

code [****] After getting this security code for thatspecific amount Company/bearer can withdraw cash

if Account No, Amount and Security code for this

amount matched perfectly. If everything matches and

cash withdrawal is complete, then a confirmation

SMS will be sent to the Company. That is: Taka

[****] has been successfully withdrawn from your

Account no. [****]. In Figure 6: Withdrawal of cash

from bank account is shown.

C.  Checking Account Balances And Transaction

 Reviews

To check account balances or status of the account,

the admin has to send *short code (for balance

checking)* Account number*pin code* branch code#

This module checks if the companys account number

exists and also checks if the pin code sent also exists,

if the pin code corresponds with the account number

sent, the companys account balance is sent to its

GSM phone number which was used to request for

the balance. The admin of the company receives the

message in this format.

Account Balance as at [Date] is [amount] . In Figure

7: Checking account balances and transaction

reviews are shown.

Fig. 4 Withdrawal of cash from Bank Account

Fig. 5 Checking Account balances And

Transaction Reviews

 D.  Changing Of Pin Code

Page 5: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 5/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 313 

The pin code of an account can be changed if the

admin of the company wishes to change it for the

security purpose. The admin has to send a message in

this format.

CHANGE PIN [accountnumber] [oldpin] [newpin]

*short code (for changing pin) *Account

Number*present pin# The admin is notified of thechange, and he/she receives a message that says Your

Pin code successfully changed.new pin code is

[****]. In format of Figure 8: Changing of pin code

for the admin is shown.

Fig. 6 Changing Pin Code

Fig. 7 Groups of User Level

6.  ENVIRONMENTAL CONSTRUCTION OF

THE E-GOVERNMENT AND

ADMINISTRATION

The E-Government environs comprises of threeschemes: A Portal, the e-protocol and e-applications / 

e-petitions systems. The final deuce will be

accounted as unitary, since the latter may be studied

as an annex of the e-protocol arrangement. The

governmental organization comprises of six sections

(planning, havoc compensation, housing, protocol,

finances and research). Each department has one

managing director.

 A.   Portals Surround Tools

The environs include instruments that offer up

tractability and ability contingent on their use. The

conception of these tools are established on web

services, such as discourse assemblies, chitchat,

message box, e-libraries, which are farfung in the

public web community of interests. These tools aredifferentiated in two groups: informatory and

communicating. On one hand, the informatory tools

admit avails related to the information of 

governmental functions and their presentation. On the

other hand, the communicating tools admit services

that allow for the communication of dissimilar user

groups. The environment modifies the direction of 

these tools consorting to the user groups permission.

More explicitly, the informatory tools are the

following: annunciations, frequently asked questions

(FAQ) and e-libraries. Sever- ally, the

communicating tools are discussion forums, message

boxes, chat and e-requests. Ultimately, it must be

noted that the environment links the tools consorting

to the particular user level permissions. These levels

are studied in the incisions to follow.

 B.  Groups of user levels

Seven user levels are identified in the environment.

Different affirming tools subsist in each of them.

Relying on the corresponding use, these degrees have

also a dissimilar function: administrator, manager,

director, employee, protocol (employee) and

registered user, civilian or guest. Each of them

interacts with the other through the informatory and

communicating tools related to each level.C.   Decision maker Administrator

The executive coordinates and deals the e-

government application via the administration tools.The administrator decides which user level group has

the permission to use the corresponding informatory

and communicating tools. Furthermore, theadministrator/executive can intercommuni-cate with

the rest user levels in order to resolve issues and has

the prerogative of updating the arrangement.Ultimately, the administrator adjudicates about the

formulation, innovation and dissemination of theelectronic content to the citizens. Through and

through user well-disposed and interactive ICT webtools, the administrator authors the governmental

substance.

 D.  Groups Associated with Manager-Director- Employees

These three user degrees are delineated together, as

they integrate many laws of similarity. The Managingdirector resolves about the formulation, conception

and dispersion of the electronic content. What is

Page 6: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 6/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 314 

more, by the communication tools, the employees

collaborate with the directors, the directors with the

Managing director and the Managing director with

the Decision maker with regard to problems solution

and ideas interchange for the meliorate funct-ionality

of the arrangement. In conclusion, these three user

levels act as a significant and various role in the e-protocol string, as will be depicted afterwards.

 E.   Protocol Executive

The Protocol Executive is responsible for the e-

protocol scheme. Besides the Informatory and

Communicating Tools, has the power to view, change

(under conditions) and add applications / petitions to

the e-protocol system (Fig. 8). The applications / 

petitions are amply categorized and new categories

can be created.

 F.  Groups Associated with Registered / 

 Authorized User

The authoritative users have the power to see and

alter particular info involving their account, can view

the advancement of their applications / petitions and

finally can make new applications / petitions, which

are affirmed by the e-application / e-petition scheme.

Fig. 8 Executive or Administration Tools

Fig. 9 Tools Associated with Manager-Director-

Employees Environments

G.  Groups Associated with Unauthorized User / 

Guest

Unauthorized User / Guests can enter and search the

organization as a way of conglomerating significant

infor-mation. Finally, he/she may be informed about

the news and results via the news program and

calendar service. 

7.  USER TOOLS AND SERVICES

 A.   Executive ToolsThe environment provides executive tools that are

branched in two groups as follows: management of 

the portal system and management of the e-protocoland e-applications / e-petitions system. Management

of the Portal system incorporates management of theinformatory services and management of the

communicating services (Fig. 8). Management of the

informatory services is an authoritative group, asthrough it the executive has the tractability to handle

the following systems: users, e-library, main menu

description, announcements and frequently asked

questions (FAQ). The environment tools alter the

decision maker to coordinate the informatory content.Correspondingly, the communicating services group

is comprised of interactional forms thru which the

administrator manages: chat, discussion forum andmessage box. Management of the e-protocol and e-

applications / e-petitions system integrates

management of the postulations, their classes and

points in time. The transactions accomplished in each

group concern recovery, introduce and modify of the

representing information. Entirely webrequests/responses are sued through with

interactional and easy figures.Management of the informatory services is an

authori- tative group, as through it the executive has

the tractability to handle the following systems: users,

e-library, main menu description, announcements and

frequently asked questions (FAQ). The environment

tools alter the decision maker to coordinate the

informatory content. Correspondingly, the

communicating services group is comprised of 

interactional forms thru which the administrator

manages: chat, discussion forum and message box.

Management of the e-protocol and e-applications / e-petitions system integrates management of the

postulations, their classes and points in time. Thetransactions accomplished in each group concern

recovery, introduce and modify of the representing

information. Entirely web requests/responses are

sued through with interactional and easy figures.

 B.  Tools Associated with Manager-Director-

 Employees Environment

Page 7: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 7/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 315 

The environment tools (Fig. 9) of these user levels

are studied in three groups: Communication,

Informative and General Services. The group of 

communication services is the one that enables these

three levels to communicate with the other user levels.

The tools that employ these tasks are: discussion

forum, message box, and chat. The second group of the informative services is consisted of tools that

enable the fast access and management of the

electronic content. This content cannot be accessed

by unauthorized users. The general services group

includes tools that are different for each user level

and play essential role in the e-protocol chain.

Fig. 10 Tools Associated with Manager-Director-

Employees Environments

C.  Tools of the Protocol Employee Environment

The environment tools of this user level has

extended tools regarding the e-protocol system. Theprotocol em- ployee has more privileges in the e-

protocol system and also can interact with the e-

petitions system. This level is the starting and ending

point in the e-protocol chain. In figure 4, tools of the

protocol administrator environment is shown.

 D.  Tools of the Registered - Authorized Users

 Environment

The Registered User has the privilege to interact withthe e-Petitions system. He / She can submit an

application to the agency, as long as it is supported

by the system. Moreover has the ability to track the

status of the applications he / she had submitted in

the past. Finally, he / she can view and change someof his account information. In figure 11, tools

associated with registered users environment

administrator is shown.

Fig. 11 Tools Associated with Manager-Director-

Employees Environments

8.  NETWORK SECURITY

For network security a watermarking scheme withfast encryption and compression is applied for voice

signal, used in authentication. During this security

system design size of data is maintained small. For

this maintenance a lossless compression algorithm isintroduced [7]. We may also use other lossless [8],[9]or lossy algori-thms [10]. Like other common

lossless [11]-[14] compres-sion systems applied

compression system is also depends on probability of occurrence.

 A.   Proposed Compression system

In proposed technique PCM signals are compressed.In practical case a signal contains large number of 

same valued samples. Suppose samples are taken as

8-bit PCM; value of samples will be -128 to +127

according to 2’s compliment number. The value of a

sample 120 or more is rare. Most of the samplecontains a value, near zero. The values of samples

have normal distribution of variance,  σ = 6 to 25;

depending on signal source [15].

Formula of normal distribution is shown in eqn. (1)-

Here,σ

2= variance, μ  = median,  x = value of a sample.

So a sample having a value 125 is very rare.

According to this equation this probability is 3.7574×10−96 (calculating using Matlab and considering

σ = 6) to 5.9626 ×10−8 (considering σ = 25). In a

signal of 14,001 samples, no sample has value of 125.The value 127 is not so rare because when a sample

have value 127 or more; the value of this sample issaved as 127.

Here, the value 125 is used as identifier of 

repetition. Though probability a sample having thisvalue is very rare, this case should be considered. If 

any sample has the value 125 the value should be

changed to 126. The value 126 is very close to 125.

Page 8: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 8/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 316 

Energy of signal is proportional to square of 

amplitude. So percentage change in energy of signal

due to this change is (1 - 1252/1262) = 1.58% for

only this sample. According to Weber’s law-

equally perceived differences have values

  proportional to absolute levels. It’s mathematical 

expression is as eqn. (2)

From this law the following equation (eqn. (3) )is

derived-

Here,

r = response, s = stimulus, k = constant.For this intensity of signal is measured in db (decidel)

and signals are compressed by µ-law or A-law before

sampling.

When the signal is previously compressed by µ-law

or A- law, change in response of signal will be (126 -

125)/125 = 0.8% When the signal is not compressed

by µ-law or A-law, change in response of signal will

be very small. Assuming 20 consecutive samples hasthe value 0 and to represent it 3 consecutive samples

are needed. They are-

s1 = 0 //value of samples2 = 125 //identifier of repetition and s3 = 19.

 //number of repetitionHere, s3 is an unsigned 8-bit integer; may hold value

0 to 255.

Fig. 12. Flowchart of proposed compression

system 

Fig. 13. Flowchart for changing value of sample,

when any sample contains value 125Problem may arise when number of repetition is

more than 255. Assuming 540 consecutive sampleshas the value 0 and to represent it 5 consecutive

samples are needed. They are-

s1 = 0 //value of sample

s2 = 125 //identifier of repetition

s3 = 255s4 = 255

s5 = 29

From the values of samples, number of repetition is255 +255 + 29 = 539

When number of repetition is 255, then s3 = 255 and

s4 = 0. s3 = 255 means repetition continues to s4 ands4 = 255 means repetition continues to s5 etc.

For 16 or 32 bit PCM data we will use (2N−3) asidentifier of repetition. If this number exists in

sample value will be changed by adding 1.

Fig. 15 shows the flowchart of proposed compressionsystem. Fig. 16 shows how problem of having 125

valued samples is shown.

 B.    Proposed Watermark with fast encryption

Scheme

In compression system blank spaces are created. Aspeech signal contains 8000 samples per second and

10-60% of it is compressed in proposed compression

system. Watermarks are added repeatedly in blank spaces. 10-60% of 8 kilobyte data is huge location for

information. Watermark information will be usersname, id, network, location, IP address, Mac address,

position etc. Watermarks are added repeatedly for

overcoming watermark attacks- such as copy-pasteattack. In copy-paste attack of a part of signal is cut

or second half of voice signal is sent to receiver so

that watermark information is eliminated. When weare watermarking repeatedly copy-paste attack will

no longer applicable for this. Encryption is used withwatermark for providing top level security.

The root of the word encryption — crypt  — comes

from the Greek word kryptos, meaning hidden orsecret. In its earliest form, people have been

attempting to conceal certain information that theywanted to keep to their own possession by

substituting parts of the information with symbols,

numbers and pictures, this paper highlights in

Page 9: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 9/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 317 

chronology the history of Cryptography throughout

centuries [16-20].

The rapid progress in wireless communication

systems such as- mobile systems, and smart card

technology in our society makes information more

vulnerable to abuse. In a communication system,

the content of the communication may be exposed toan eavesdropper. For these reasons, it is important

to make information systems secure by protecting

data and resources from malicious acts. Crypto

(cryptography) algorithms are the core of such

security systems, offering security services of data

privacy, data integrity, authenticity and non-

repudiation [21].

Cryptography plays an important role in the security

of data transmission. The Advanced Encryption

Standard Algorithm [22-24] (AES) is used as the

most trustworthy and commonly used algorithm for

encrypting data. But it is not a fast method in

execution. In Recofigurable Implementation for the

AES Algorithm encryption process is performed in

nine rounds. Here we are proposing simpler. In this

method the size of encrypted data is not large. In

implementation method of AES algorithm [25] no

random variable is used. In Elliptic Curve Digital

Signature Algorithm [26] (ECDSA) random variable

is used, but ECDSA encryption process is very

complex and lengthy one. In Data Encryption

Standard [27] (DES) a 64 bit key is generated. Data is

decrypted using this key. This is not a fast process

and size of encrypted data is not small. Brute-force

Attack can break DES algorithm. In CAVE [28]algorithm execution is not fast, in this algorithm key

is generated; key is not too large. So it may be

decrypted by finding key using input combinationeasily.

In proposed encryption technique a random 9th

bit is

declared for each sample. This extra bit is insertedafter compression and addition of watermarks.

 D. Security Testing

Network security is verified using Matlab Software.Fig. 14 shows a part of voice signal.

Fig. 14. Original signal

Fig. 15 shows compression and creation of space for

watermark. Slight difference exists between flow

chart of Fig. 12 and this result. In Fig. 12 repeated

samples are escaped without changing. In following

figure compressed samples are made -125 or better

understanding. Before that an identifier of 

notification and number of repetition exists. Numberof repetition is an unsigned 8-bit integer having value

0 to 255. Other samples have value -128 to 127.

Fig. 15. Compressing and creating space for

watermark where sample value - 125 represents

space for watermarkFig. 16 shows position of watermarks or spaces

created for inserting watermark repeatedly.

Fig. 16. Watermark in the created pace Fig. 17 shows compressed and watermarked signal.

Fig. 17. Compressed signal with watermark

Fig. 18 shows the Encrypted signal of the original

signal. Encrypted samples have values from 0 to 511,

as 9th

bit random number is inserted beforeencryption. We will get same signal as Fig. 17 after

decryption, as encryption is lossless. Aftereliminating watermark from signal and signal

reconstruction we will get signal of Fig. 15.

Page 10: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 10/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 318 

Fig. 18. Encrypted signal of the original signal 

of Fig. 14 

9.  E-GOVERNMENT OPPORTUNITIES

 A.  Quality of Service Delivery to Businesses and 

Customers

In the conventional model of public service delivery,

the processes, procedures and operations are banally

time consuming, long and lack transparency.

A business that wishes to obtain a license or a permit

has to fill out a number of application forms, has to

visit a number of different offices and spend aconsiderable amount of time.

If a citizen wishes to be issued with a certificate or

any other official document, he or she will have totravel to the central government office, go to different

offices and spend a lot of time for a simple service.

The consequences are high costs and citizen andbusi- ness dissatisfaction. An e-Government initiative,

on the other hand, which puts government services

online, thereby reducing the bureaucracy, offers

round the clock accessibility, fast and convenient

transactions, and obviously enhances the qual- ity of services, in terms of time, content and accessibility.

Example: In Bahia, Brazil, Citizen Assistance

Service Centres have been created offering over 500separate services.

These centres are placed in shopping malls or otherpublic places, and people going to shop can

simultane- ously apply for different public services

such as getting an identification card, looking for anew job, getting a passport, and checking on their

retirement eligibility. Customer satisfaction studies

revealed that over 89of citizens evaluated the service

centers as excellent. Thus, the quality of services is

ensured by the reduced time that users spend on

getting official documents, waiting and queuing toget documents, travelling, as well as more

customized products and services, error freedocuments and 24*7*365 accessibility.

 B.  Transparency, Anti-corruption and  Accountability

E-Government helps to increase the transparency of 

decision-making processes. In many cases e-Government offers opportunities for citizens to

directly participate in decision-making, by allowing

them to provide their own ideas and suggestions in

forums and on- line communities. If web sites are

designed carefully and openly, they can be valuable

resources for transparency as citizens, businesses and

other stakeholders should be able to see political and

governmental information, rules and policies.Previously it was often necessary to go directly to

governmental offices to obtain information, but now

this information should be available on the web. The

availability of a diversity of publications regarding

the activities of the public administration, as well as

economic and legislative aspects, increases the

transparency too. Example: The Central Vigilance

Commission (CVC) in India started an initiative to

create a website with the objective of reducing

corruption and increasing transparency by sharing a

large amount of information related to corruption

with citizens. The CVC website communicates

directly with the public through messages and

speeches to bolster confidence in the institution,

informs the public about its efforts in fighting

corruption, and makes public the names of officers

from the elite administrative and revenue services

against whom investigations have been ordered or

penalties imposed for corruption. Members of the

public are highly encouraged (mainly by rewards) to

make their complaints and to provide information

against a public servant about taking of bribes in

order for the commission to undertake the necessary

anticorruption actions to eliminate bribery and to

increase the transparency of rules, procedures andservice delivery. 

10.  CONCLUSIONS

In this paper, we presented an e-government envi-

ronment based on ICT tools. Our contribution is

based on the proposal of a generic electronic schemethat enables distant collaboration of the agencies

employees and the e-citizen. The included tools servecommunicational and informative governmental

functions through a user-friendly, interoperable and

distributed web-based architecture. Summing up, wemust note that two  basic axes are served. The first is

the communication of the employees and the e-citizen, 24 hours per day, and the e-content

development for different user levels. The second axe

includes the delivery of e-services to the citizen. Byimplementing these system proposed in this paper,

there will create a sound administration, where

transparency and security of authority is guaranteed.This model of E-Governance must be Pragmatic in

manner for Transparent and Robust Administrative

Page 11: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 11/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 319 

Protocol whenever it is Integrated and merged with

E-Business.

ACKNOWLEDGEMENT

Authors would like to thank Bangladesh University

of Engineering & Technology for providing facilities

to conduct the research.

REFERENCES

[1]  Herzberg, A. Payments and banking with mobile

personal devices, Communications of the ACM,

Wireless networking security, Vol. 46, Pages:53,

Issue 5, May 2003.

[2]  Lord, S. Trouble at Telco: When GSM Goes Bad.

Network Security, Issue 1, Page 10 -12, 2003.

[3]  Michiel Backus, E-Governance and Developing

Countries: Introduction and Examples, Research

Report, International Institute for

Communication and Development (IICD), No. 3,

April 2001.[4]  Farooq Sobhan, M. Shafiullah, Zahid Hossain,

Mridul Chowdhury. Study of e-Government in

Bangladesh, Research Report, Bangladesh

Enterprise Institute, Bangladesh, April 2004.

[5]  Kelvin Chikomo and Ming Ki Chong ,

Supervisor: Alapan Arnab, Andrew Hutchison.

Security of mobile banking Project proposal ,

Data Network Architecture Group ,2005

[6]  (2008) The Biometric Group website. [Online],

Available in http:// www.biometricgroup.com/ 

[7]  M. D. Kabir, S. Bahauddin et al., “A Theory of 

Loss-less Compression of High Quality Speech

Signals with Comparison,”  in UKSim Fourth  European Modelling Symposium on Computer 

 Modelling and Simulation (EMS 2010), pp. 136-

141, 17-19 Nov. 2010.

[8]  T. Liebchen, T. Moriya, N. Harada, Y.

Kamamoto, and Y. A. Reznik, “The MPEG-4

Audio Lossless Coding (ALS)Standard -

Technology and Applications,” in 119th

Convention, 2005 October 710 New York, NY,

USA

[9]  T. Liebchen, “MPEG-4ALS -The Standard for

Lossless Audio Coding” in The Journal of the

Acoustical Society of Korea, vol. 28, no. 7,

October 2009.[10]  M. D. Kabir, S. Bahauddin et al., “Non-linear

Down-sampling and Signal Reconstruction,

Without Folding,”  in UKSim Fourth European

  Modelling Symposium on Computer Modelling

and Simulation (EMS 2010), pp. 142-146, 17-19

Nov. 2010.

[11]  Giria; B. M. Raob; S. Chattopadhyaya, “Split

Variable-length Input Huffman Code With

Application to Test Data Compression for

Embedded Cores in SOCs ,” in International

Journal of Electronics, Vol. 96, Issue 9, pp 935

- 942, September 2009.

[12]  FLAC open-source audio compression

program, Available in-

http://flac.sourceforge.net

[13]  What is TTA?, Available in-http://www.coolutils.com/Formats/TTA  

[14]  Stuart, P. Craven, M. Gerzon, M. Law, R.

Wilson, ”MLP l ossless Compression” in AES

9th Regional Convention, Tokyo, 23-25 June,

2009.

[15]  R. E. Walpole, R. H. Myers, Probability &

Statistics for Engineers and Scientists, 2nd ed.

[16]  Bacon: Sir Francis Bacon, ``De Augmentis

Scientarum'', Book 6, Chapter i. [as quoted in C.

Stopes, ``Bacon-Shakspere Question'', 1889

[17]  http://all.net/books/ip/Chap2-1.html

[18]  http://www.wakecomp.com/josh/history.html

[19]  http://www.cybercrimes.net/Cryptography/Articl

es/Hebert.html

[20]  http://www.massconfusion.com/crypto/Lecture/i

ntro2.shtm

[21]  P. C. van Oorschot, Alfred J. Menezes, and Scott

A. Vanstone, 1996. "Handbook of Applied

Cryptography." CRC press Inc., Florida

[22]  X. Zhang and K. K. Parhi "Implementation

Approaches for the AES Algorithm" 2004; IEEE

Educational Activities Department, NJ USA

[23]  R. Ashruf, G. Gaydadjiev, S. Vassiliadis

"Reconfigurable Implementation for the AES

Algorithm" 2002

[24]  P. Su, T. F. Lin, C. T. Huang, and C. W. Wu "A

High-Throughput Low Cost AES Processor" ,National Tsing Hua University 2003

[25]  M. K. Hani, H. Y. Wen, A. Paniandi. "An

Implementation Of Elliptic Curve Digital

Signature Algorithm In FPGA-Based Embedded

System For Next Generation IT Security"

Penang 20-22 July 2005 The International

Conference on Robotics, Vision, Information and

signal processing

[26]  M. E. Smid & D. K. Branstad "The Data

Encryption Standard Past and Future" ; National

Institute of Standards and Technology

[27]  Elbaz & H. Bar-El "Strength Assessment Of 

Encryption Algorithms" Discretix TechnologiesLtd.

[28]  W. Millan, P. Gauravaram, "Cryptanalysis of 

cellular authentication and voice encryption

algorithm" Information Security Research

Centre; Queensland University of Technology

(Modified last in 2009)

Syed Bahauddin Alam has taken his baccalaureate

degree from Electrical & Electronics Engineering (EEE)

at Bangladesh University of Engineering and

Page 12: GSM and ICT

8/3/2019 GSM and ICT

http://slidepdf.com/reader/full/gsm-and-ict 12/12

S B Alam, R Bulbul| GSM and ICT Framed E-Governance Incorporated with Network Protection

International Journal of Mobile & Adhoc Network|Vol1|issue 2|Aug 2011 320 

Technology (BUET) at 2011. He has passed Secondary

School Certificate (SSC) at 2003 and Higher Secondary

School Certificate (HSC) at 2005 from Faujdarhat Cadet

College (FCC). His interests are Signal Processing,

Security of GSM Technology, Particle physics,

Electromagnetic Shielding, Atomic property analysis

and simulation, Bremsstrahlung and radiation physics,

analysis of confinement times, time utilization factor,

Poisoning effect of Xenon and samarium and 3-D

Compton Imaging. He has published International

research paper based on Nuclear Energy and Physics for

the very first time from Bangladesh. As well as, he has

published highest numbers of International research

papers at undergraduate level in Bangladesh.