Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.12.78

Centralized Smart Government Architecture based on Trust Manager  

Ahamad, Shaik Shakeel (College of Computer and Information Sciences, Majmaah University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.12spc, 2021 , pp. 565-569 More about this Journal
Abstract
The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost
Keywords
Wireless Bridge Certifying Authority (WBCA); Wireless Public Key Infrastructure (WPKI); Mobile Government (MG); Trust Manager (TM);
Citations & Related Records
연도 인용수 순위
  • Reference
1 Kushchu I (2007) Mobile government: an emerging direction in e-government. Mobile Government Consortium International, UK. IGI Publishing
2 Layne, K., & Lee, J. (2001). Developing fully functional e-government: A four stage model. Government Information Quarterly, 18, 122-136. doi:10.1016/S0740-624X(01)00066-1   DOI
3 Kakihara, M., & Sorensen, C. (2002). Mobility: An Extended Perspective. 35th Hawaii International Conference on System Sciences, Hawaii, USA.
4 Easton, J. (2002). Going Wireless: transform your business with wireless mobile technology. USA: HarperCollins.
5 Goldstuck, A. (2004). Government Unplugged: Mobile and wireless technologies in the public service. Center for public services innovation, South Africa.
6 Roy A, Banik S, Karforma S (2011) Object oriented modelling of RSA digital signature in e-governance security. Int J Comput Eng Inf Technol 26:24-33
7 Burrows, M., Abadi, M. and Needham, R. (1990) 'A logic of authentication', ACM Transactions on Computer Systems, Vol. 8, No. 1, pp.18-36.   DOI
8 Roy A, Karforma S (2012) Object oriented approach of digital certificate based e-governance mechanism. ACEEE Conf Proc Ser 3:3-4
9 Yang, J.-H., Chang, Y.-F., & Chen, Y, "An efficient authenticated encryption scheme based on ecc and its application for electronic payment," Information Technology and Control, vol. 42, no. 4, pp 315-324, 2013.
10 Kushchu, I., & Kuscu, H. (2003). From e-government to m-government: Facing the Inevitable? In the proceeding of European Conference on e-government (ECEG 2003), Trinity College, Dublin.
11 Burrows, M., Abadi, M. and Needham, R. (1989) 'A logic of authentication', Proceedings of the Royal Society of London A, February, Vol. 426, pp.233-271, A preliminary version appearedas Digital Equipment Corporation Systems Research Center report No.39.
12 Maged Hamada Ibrahim, Saru Kumari, Ashok Kumar Das, and Vanga Odelu, "Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mobile satellite networks," Security Comm. Networks, vol. 9, pp 5563-5580, 2017.   DOI
13 Mubarak S. Al-Mutairi. M-Government: Challenges and Key Success Factors - Saudi Arabia Case Study. pp 78-96
14 Roy A, Karforma S (2013) UML based modeling of ECDSA for secured and smart E-Governance system. In Computer Science and Information Technology (CS and IT-CSCP 2013), Proceedings of National Conference on Advancement of Computing in Engineering Research (ACER13) organized by Global Institute of Management and Technology, pp 207-222. doi:10.5121/csit.2013.3219   DOI
15 Jen-Ho Yang, Ya-Fen Chang, and Yi-Hui Chen, "An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment," Information Technology and Control, vol.42, No.4, 2013.