DOI QR코드

DOI QR Code

Centralized Smart Government Architecture based on Trust Manager

  • Received : 2021.12.05
  • Published : 2021.12.30

Abstract

The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost

Keywords

References

  1. Mubarak S. Al-Mutairi. M-Government: Challenges and Key Success Factors - Saudi Arabia Case Study. pp 78-96
  2. Layne, K., & Lee, J. (2001). Developing fully functional e-government: A four stage model. Government Information Quarterly, 18, 122-136. doi:10.1016/S0740-624X(01)00066-1
  3. Kakihara, M., & Sorensen, C. (2002). Mobility: An Extended Perspective. 35th Hawaii International Conference on System Sciences, Hawaii, USA.
  4. Easton, J. (2002). Going Wireless: transform your business with wireless mobile technology. USA: HarperCollins.
  5. Kushchu, I., & Kuscu, H. (2003). From e-government to m-government: Facing the Inevitable? In the proceeding of European Conference on e-government (ECEG 2003), Trinity College, Dublin.
  6. Goldstuck, A. (2004). Government Unplugged: Mobile and wireless technologies in the public service. Center for public services innovation, South Africa.
  7. Kushchu I (2007) Mobile government: an emerging direction in e-government. Mobile Government Consortium International, UK. IGI Publishing
  8. Roy A, Banik S, Karforma S (2011) Object oriented modelling of RSA digital signature in e-governance security. Int J Comput Eng Inf Technol 26:24-33
  9. Roy A, Karforma S (2012) Object oriented approach of digital certificate based e-governance mechanism. ACEEE Conf Proc Ser 3:3-4
  10. Roy A, Karforma S (2013) UML based modeling of ECDSA for secured and smart E-Governance system. In Computer Science and Information Technology (CS and IT-CSCP 2013), Proceedings of National Conference on Advancement of Computing in Engineering Research (ACER13) organized by Global Institute of Management and Technology, pp 207-222. doi:10.5121/csit.2013.3219
  11. Burrows, M., Abadi, M. and Needham, R. (1989) 'A logic of authentication', Proceedings of the Royal Society of London A, February, Vol. 426, pp.233-271, A preliminary version appearedas Digital Equipment Corporation Systems Research Center report No.39.
  12. Burrows, M., Abadi, M. and Needham, R. (1990) 'A logic of authentication', ACM Transactions on Computer Systems, Vol. 8, No. 1, pp.18-36. https://doi.org/10.1145/77648.77649
  13. Yang, J.-H., Chang, Y.-F., & Chen, Y, "An efficient authenticated encryption scheme based on ecc and its application for electronic payment," Information Technology and Control, vol. 42, no. 4, pp 315-324, 2013.
  14. Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, and Vanga Odelu, "Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks," Security Comm. Networks, vol. 9, pp 5563-5580, 2017. https://doi.org/10.1002/sec.1717
  15. Jen-Ho Yang, Ya-Fen Chang, and Yi-Hui Chen, "An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment," Information Technology and Control, vol.42, No.4, 2013.