Browse > Article
http://dx.doi.org/10.14400/JDC.2019.17.9.161

mNPKI for Mobile Government in Developing Countries  

Kim, Hyunsung (Department of Cyber Security, Kyungil University)
Publication Information
Journal of Digital Convergence / v.17, no.9, 2019 , pp. 161-171 More about this Journal
Abstract
Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.
Keywords
Information Security; Electronic Government; Mobile Government; Public Key Infrastructure; National Security; Digital Certificate;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 I. K. Rohman & L. Veiga. (2017). Against the Shadow: the Role of e-Government, in Proc. of the 18th Annual International Conference on Digital Government Research, (pp. 319-328). New York : ACM.
2 A. Das, H. Singh & D. Joseph. (2017). A longitudinal study of e-government maturity.Information & Management, 53, 415-426.
3 H. Kim & H. Choi. (2016). Research on Deployment Strategy of Public Key Infrastructure for Developing Country: Focused on Malawi. Journal of Digital Convergence, 14(10), 45-51.   DOI
4 J. Jo & S. Choi. (2016). Firm's Market Value Trends after Information Security Management System(ISMS) Cerficiation Acquisition. Journal of the Korea Convergence Society, 7(6), 237-247.   DOI
5 D. Kang, M. J. Park, D. H. Lee & J. J. Rho. (2017). Mobile services with handset bundling and governmental policies for competitive market. Telematics and Informatics, 34, 323-337.   DOI
6 A. Jansen & S. Olnes. (2016). The nature of public e-services and their quality dimensions, Government Information Quarterly, 33, 647-657.   DOI
7 C. E. V. Madhavan & P. K. Saxena. (2003). Recent Trends in Applied Cryptology. IETE Technical Review, 20(2), 119-128.   DOI
8 National Institute of Standards and Technology. (2000). Federal Agency Use of Public Key Technology for Digital Signatures and Authentication.
9 Solution Profile-U.S. Federal Bridge Certification Authority (FBCA), European Federated Validation Service Study, 2009.
10 DFN-PKI Certificate Policy - Security levels: Global, Classic and Basic, Deutsches Forschungsnetz, 2006.
11 J. Kim, S. Park, H. Cho, J. Kim & J. Y. Choi. (2017). Public trust in a mobile device and service policy in South Korea: The Mobile Device Distribution Improvement Act. Telematics and Informatics, 34, 540-547.   DOI
12 Z. Li & F. Yang. (2016). The E-government Information Model Based on GPR. Government Information Quarterly, 33(2), 291-304.   DOI
13 W. Lam. (2005). ZBarriers to e-government integration, Journal of Enterprise Information Management, 18(5), 511-530.   DOI
14 Informata. (2001). Mobilizing public services in Africa: The m-government challenges, 1-12.
15 J. Poushter & R. Oates. (2015). Cell Phones in Africa: Communication Lifeline-Texting Most Common Activity, but Mobile Money Popular in Several Countries, Pew Research Center.
16 S. F. Verkijika & L. D. Wet. (2018). A usability assessment of e-government websites in Sub-Saharan Africa. International Journal of Information Management, 39, 20-29.   DOI
17 M. Z. I. Lallmahomed, N. Lallmahomed & G. M. Lallmahomed. (2017). Factors influencing the adoption of e-Government services in Maturittius. Telematics and Informatics, 34(4), 57-72.   DOI
18 United Nations. (2005). Global E-Government Readiness Report 2005.
19 OMB Memorandum M-00-10. (2000). OMB Procedures and Guidance on Implementing the Government Paperwork Elimination Act,
20 European Parliament. (2013). Security of eGovernment System Final Report, Science and Technology Options Assessment, IP/A/STOA/FWC/2008-096/LOT4/C1/SC10.
21 I. Marin, N. A. J. Al-Habeeb, N. Goga, A. Vasilateanu, I. Pavaloiu & C. Boiangiu. (2017). Improved M-Government based on Mobile WiMAX, in Proc. of 2017 21st International Conference on Control Systems and Computer Science, Bucharest, Romania, 37-42.
22 S. Hong. (2014). Research on Wireless Sensor Networks Security Attack and Countermeasures: Survey. Journal of Convergence for Information Technology. 4(4), 1-6.   DOI
23 H. Jin & P. Papadimitratos. (2016). Proactive certificate validation for VANETs, in Proc. of 2016 IEEE Vehicular Networking Conference, (pp.1-4). USA: IEEE.
24 H. Kim. (2013). Privacy Preserving Security Framework for Cognitive Radio Networks. IETE Technical Review, 30(2), 142-148.   DOI
25 S. H. Lee. (2015). Cloud computing Issues and Security measure. Journal of Convergence for Information Technology, 5(1), 31-35.   DOI
26 NIST Special Publication 800-57. (2013). Recommendation for Key Management Part 3: Application-Specific Key Management Guidance.
27 W. Shanks & H. Khiabani. (2013). Building and managing a PKI solution for small and medium size business, The SANS Institute.
28 B. Payne. (2016). PKI at Scale using Short-lived Certificates, in Proc. of USENIX Enigma 2016, San Francisco, CA.
29 J. Rowley. (2016). How Short-Lived Certificates Improve Certificate Trust, Digicert blog, https://blog.digicert.com/short-lived-certificates/.
30 IETF RFC 3280. (2002). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
31 NIST Special Publication 800-25. (2000). Federal Agency Use of Public Key Technology for Digital Signatures and Authentication.
32 Y. Lee, J. Lee & J. Song. (2007). Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce. Computer Communications, 30, 893-903.   DOI
33 C. Marufu & K. A. Maboe. (2017). Utilisation of mobile health by medical doctors in a Zimbabwean health care facility. Health SA Gesondheid, 22, 228-234.   DOI
34 B. Klievink, A. Neuroni, M. Fraefel & A. Zuiderwijk. (2017). Digital Strategies in Action-a Comparative Analysis of National Data Infrastructure Development, in Proc. of the 18th Annual International Conference on Digital Government Research, (pp. 129-138). New York : ACM.