4_71070000667951107

Upload: swati-muttu

Post on 02-Jun-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 4_71070000667951107

    1/5

    Multipurpose Smart SIM Card Based on Mobile

    Database and Location Dependent Query

    Hamid-Reza Firoozy-Najafabadi

    Department of Computer EngineeringScience and Research Branch, Islamic Azad University

    Tabriz, Iran

    [email protected]

    Mohammad-Reza Feizi-Derakhshi

    Department of Computer ScienceUniversity of Tabriz

    Tabriz, Iran

    [email protected]

    Abstract According to increasing development of

    technology and in order to approaching electronic

    government, most citizen services are presented

    electronically using smart electronic cards. Regarding this

    fact, people have several smart cards which are increasing

    in number everyday. Despite of so many advantages, these

    cards have various disadvantages such as multiplicity,

    troublesome carrying, unavailability of card readers in

    many places, waiting in the queues of ATMs, etc. In thispaper we will present a new approach named

    multipurpose smart SIM card in order to solve these

    problems. Proposed SIM card, acts based on mobile

    database architecture that we will discuss about this

    architecture and location dependent queries processing in

    it. Then we will study the problem of finding the nearest

    and most unoccupied ATM as a case study and at last we

    will propose a method to authenticate users in this system.

    Keywords- smart SIM card; mobile computing; mobile

    database; location dependent query; authentication

    I. INTRODUCTION

    Todays world is a technological world and its dominantatmosphere induces human toward mechanization andfacilitation. In this case and across growing procedure oftechnology, concept of electronic card has been established.Such cards help us doing our tasks timely and reliably.

    Nowadays smart cards are used as bank card, telephonecard, subway credit card, fuel card, buying card, health card,etc. [10]. And the number of these cards is increased everydayand some other new electronic cards like health electronic card,passport electronic card, driving license card and so many otherelectronic cards will be required. So one day in a future weshould carry so many electronic cards every time we want togo out. Another problem is the limitation and low availabilityof card readers. It means that when you are at home, in your

    car, out of city or other places where there are not any cardreaders or ATMs, in this case you are not able to use yourcards.

    The solution of these problems is an integration of smartcards that some countries have attempted to produce a national

    smart card [9, 10] in order to integrate a variety of smart cardinformation on one card to fix the problems. The national smartcard is a plastic card about the size of a credit card, with anembedded micro-chip to deliver one or more intelligentcapabilities. The national smartcard framework is one of anumber of frameworks and strategies developed to supportinteroperable whole-of-government business applications [10].

    In this paper we propose a method to this integration and

    that is multipurpose smart SIM card. A subscriber identitymodule or SIM is a smart card that is designed to fit intomobile phone. It provides the identification of a user to anetwork, allowing him or her to access such services astelephony, email, internet and text messaging. The SIM cardcontains a microcomputer as well as a certain amount ofmemory named Random Access Memory (RAM) to processcommands and Electronically Erasable Programmable ReadOnly Memory (EEPROM) to store user files. The SIM cardalso contains an amount of Read Only Memory (ROM) whichstores the cards operating system. When the SIM card isactivated the microcomputer loads the operating system fromROM into the RAM of the card and processes commands asrequested by the mobile equipment (ME) or card access device(CAD). Naturally architecture and foundation network of thisplan should follow a particular standard that we will discussabout this issue further.

    After this introduction, paper is organized as follows:section 2 provides an overview of mobile database architectureand in section 3 queries processing in the mobile database isdiscussed. Section 4 presents the proposed method to integratesmart cards and section 5 presents a case study to illustrate apractical application of the proposed method. Finallyconclusion and future work is presented.

    II.

    THE ARCHITECTURE OF MOBILE DATABASE

    Proposed SIM card database should be implemented basedon mobile database architecture. A mobile database is a kind of

    distributed database that supports mobile computing [4]. Itmeans that its database is distributed on some fixed and mobileparts so that across movement of users and location changingof their mobile phones, wireless network has capability ofprocessing of transactions and data management.

    978-1-4673-1740-5 /12/$31.00 2012 IEEE

  • 8/10/2019 4_71070000667951107

    2/5

    Figure 1. Mobile database architecture

    Figure 1 shows mobile database architecture whichincludes:

    Fixed Network (FN):Is a conventional wired networkwhich interconnects some other stationary parts [1, 3].

    Fixed Host (FH): This part has a fixed place innetwork and it does not have wireless interface.

    Therefore mobile units cant connect to it directly [1,5].

    Cell:Network covered area is divided into some cellsthat the size of these cells depends on the power ofbase station [1, 5]. Mobile units move alternativelyamong different cells and have communication withdifferent support stations at different times.

    Mobile Unit (MU) or Mobile Host (MH):These aredevices that are moving and they have the capabilityof connecting to fixed network through wirelessconnection. Users send their transaction requeststhrough MU and receive results.

    Mobile Support Station (MSS) or Base Station (BS):

    The connection of each cell with other cells and fixedhosts is established through a wireless interface thatcalled mobile support station or base station. Inaddition this device can communicate with one MUthrough its wireless interface. Each BS has the addressof whole cells, and when one MU of one cell entersinto another cell, BS in first cell should modify theaddress of this MU so that the processing results ofcorresponding transactions of this MU send to its newaddress [1, 3].

    Database Server (DBS): This part is necessary toincorporate full database functionality [5]. Each DBScan be reached by any BS or FH directly. But MUscommunicates with a DBS only through BSs [6].

    III. QUERY PROCESSING IN MOBILE DATABASE SYSTEMS

    A.

    Types of Queries

    Definitely, transaction processing is based on mobiledatabase architecture in our proposed method. Generally there

    are two types of queries in mobile environments.Non-LocationRelated Queries (NLRQ) and Location Dependant Queries(LDQ). In fact, a NLRQ is a traditional query whose answerdoes not depend on locations and none of the predicates andattributes used in it are location related [2]. (e. g. Retrieve the

    names of hotel employees). Contrary to NLRQs, LRQs have atleast one location related predicate or attribute [6].

    B.

    Location Dependant Query

    There are two types of location dependant query:

    Location Aware queries (LAQ):which has an explicit

    indication of location (e.g. Select the names of hotels

    in Isfahan).

    Location Dependant Queries (LDQ): The locationvalue in these queries is not explicitly known when thequery is asked. Their answers are dependent to MU's

    location; i.e. the mobility affects their processing (e.g.Retrieve the nearest ATM). In order to provide theanswer to the query, first we have to know the locationof the query issuer. When we find out the issuer'slocation (Location Binding), the query becomeslocation-aware [2].

    C.

    The Architecture of The LDQ Processing

    In the Mobile Network Services, the wireless networkprovides the wireless interface and the operator has theresponsibility of supplying the location of the MU toauthorized parties with the help of the Location Service (LS).We put the LS box in traditional mobile computing architectureand assume the location of the client is either provided by the

    network or by the device (GPS). MUs can communicate withLDISM, send query and view the results with the help of theinterface [7].

    Figure 2 shows architecture of the Location DependantQueries processing.

  • 8/10/2019 4_71070000667951107

    3/5

    Figure 2. The architecture of the LDQ processing

    IV. PROPOSED METHOD

    A.

    Multipurpose Smart SIM Card

    By designing a new chip that by helping of mobile databaseintegrates the information of all the smart electronic cards andalso authentication information of each person in itself we cansolve many of the problems of smart electronic cards and theirresultant troubles. This chip called multipurpose smart SIMcard.

    Multipurpose smart SIM card has been embedded inmobile phone and it is available all the time. We can use this

    SIM card by mobile database architecture as a nationalcertification card, driving license, passport, peoples medicalhistory, fuel card, subway card, electronic election and someother applications.

    B.

    Implementation and Integration

    The practical implementation of this plan is required toprovide appropriate telecommunications infrastructure andpolicies to integrate smart cards into the multipurpose smartSIM card. That should be established and provided by theauthorities in charge. However, the proposed smart SIM cardshould be have major elements to integrate smart cardsinformation. These elements are shown in figure 3 that are:

    Figure 3. Multipurpose smart SIM card architecture

    Central Processing Unit (CPU):Is core of the smart

    SIM card that performs information processing.

    Read Only Memory (ROM): For carrying operatingsystem and built-in programs loaded at the time theSIM card chip is manufactured. The memory of sucha SIM card should be have a greater capacity incomparison with conventional SIM card, because

    should be stored grater volume of data to integratesmart cards information.

    Electrically Erasable Programming Read OnlyMemory (EEPROM): Is non volatile memory thatnormally used for storing data and SIM cardapplications.

    Random Access Memory (RAM): Is writable andvolatile memory and hence is only used for temporary

    storage.

    SIM Card Operating System: For controllingexecution of application software, loading of newapplication program files, reading and writing of datato memory, and general low-level functions, such aspower on and power off. In other words, the SIM cardoperating system is used for accessing the CPU,EEPROM, RAM and ROM.

    File System:This part may be part of the SIM cardoperating system that manages how data is stored andhow programs on the SIM card can read and write tothe EEPROM. To integrate information of smart cardsinto the multipurpose smart SIM card, this file systemshould be designed and implemented appropriate to

    provides information exchange.

    Application Software: This application runs on theSIM card CPU SIM card applications run in much thesame way as regular personal computer.

    Dedicated Hardware: To deliver certain functionsmore securely and efficiently (e. g. cryptography, co-processors etc.).

    C.

    File System Organization

    As mentioned above, to integrate information of smartcards into the multipurpose smart SIM card, this SIM cardshould be have an appropriate and efficient file system. Asshown in Figure 4, the file system of a multipurpose smart SIM

    card is organized in a hierarchical tree structure, composed ofthe following three types of elements:

    Master File (MF): The root of the file system thatcontains dedicated and elementary files.

    Dedicated File (DF): A subordinate directory to themaster file that contains dedicated and elementaryfiles.

    Elementary File (EF): Is a file that contains varioustypes of formatted data, structures as either a sequenceof data bytes, a sequence of fixed size records, or afixed set of fixed size records used cyclically.

    The Global System for Mobile Communication (GSM)standards defines several important dedicated files immediatelyunder the MF: DFGSM, DFDCS1800, and DFTELECOM. For the MFand these DFs, several EFs are defined, including many that aremandatory. The EFs under DFGSM and DFDCS1800 containmainly network related information respectively for GSM 900MHz and DCS (Digital Cellular System) 1800 MHz bandoperation. EFs for U.S. 850 MHz and 1900 MHz bands are

  • 8/10/2019 4_71070000667951107

    4/5

    found respectively under those DFs as well. The EFs underDFTELECOMcontain service related information [11].

    Figure 4. Multipurpose smart SIM card file system

    After implementing this plan, peoples communications andtransmission of required information with banks, governmentalcenters, shops, gas stations, subways, and airports can be doneusing this smart SIM card. So, people will be able to performseveral tasks like bank transactions, electronic shopping,paying the cost of vehicle fuel, cost of insurance, paying tolls

    of highways, paying the cost of public transportation systemsin addition to use communicative facilities of their own mobilephones using this SIM card. Also if the data like certificationinformation, driving license, passport and medical records havebeen saved in a database then all the governmental centers suchas police offices, airports and hospitals can do their inquiriesthrough this SIM card and using mobile database.

    D.

    Authentication of Users

    The first step to provide security is to recognize andauthenticate the users identity that wants to use databaseinformation. In this part we introduce two methods toauthenticate in this system that the second method is ourproposed method.

    Current method for user authentication in mobilephones is based on the use of 4-8 digit PersonalIdentification Numbers (PINs) [12]. In other words,authentication can be performed by a password whicheach user enters through his/her mobile phone. Theimplementation of this method is simple but if themobile phone is theft or illegal people find itspassword it may have many hazards. Also this methodmay be threatened by destructive and pervasivesoftware and it can be passed in fact we can preventrelatively by using a mechanism like figurativesecurity codes that nowadays it is considered for mostwebsites (e.g. yahoo) in order to user entrance.

    In second method in order to authenticate of users, we

    capture a photo from users face and send it to fixedhost, then we perform authentication according toreceived picture and the pattern which has beenrecorded in database from that user.

    Figure 5. Authentication of users with image processing

    Second method has high security and can solve theproblems of the first method. But it needs an image processingsystem and the mobile phone of user should be equipped withsecond camera so that it can capture the image of users face.

    In addition to these methods, using new technologies andtechniques such as PKI (Public Key Infrastructure) SIM orBiometric Techniques, It is possible to provide higher levels oftrust and security for authentication. PKI SIM is an enhancedSIM card, which incorporates a digital certificate. Thiscertificate is used to authenticate the user, so nousername/password credentials are needed. Furthermore, it canbe utilized as a digital signature and document signing in M-Police service. Biometric authentication techniques includingfingerprint recognition, retinal scanning, hand geometryscanning, handwriting and voice recognition can be used too.

    These techniques are all based on the physical properties of aperson [12].

    E.

    Advantages and Disadvantages of Proposed Method

    The advantages of this smart SIM card include: The abilityof finding the nearest and the least occupied ATM or cardreader device, high availability, easily transportation andfacility in using, low waiting in the queues of ATMs or cardreader devices, not need to carry so many smart cards, theability of using as peoples medical records, insurance booklet,driving license, passport, national card, fuel card, subway cardand etc.

    We can mention some possible disadvantages of thismethod: Low network bandwidth, power limitation (low power

    of batteries), and frequent disconnection, less reliability, higherprobability of failure (loss, damage), latency and asymmetry inthe communications (client-server vs. server-client) losing orthievery of SIM card, burning of SIM card, requiring anindividual SIM card for each person and lack of necessarytelecommunications infrastructure. [1, 4, 12].

    V. CASE STUDY

    In order to illustrate a practical application of themultipurpose smart SIM card, we designed a problem namedfinding the nearest and least occupied ATM. This case studywill be described in three steps.

    First step:Assume that a user is moving in the street and

    wants to reach to the nearest and least occupied ATM. He/shecan perform a query by using his/her mobile unit and receivesthe address and distant of the nearest ATM according to his/hercurrent location and considered distance radius from network.By using this query, even user can be aware of the number ofwaiting people in queue in order to use that ATM.

  • 8/10/2019 4_71070000667951107

    5/5

    ( ( , )), ,( )closest here radiusatm address distance count ATM

    User can receive the information of the nearest ATMaccording to his/her current location at given distance radiususing a query as follow, (e.g. 3 items) and then select the mostappropriate item according to the location of devices, theirdistances and the number of waiting people in queue.

    ( ( , )), ,

    ( )TOP3closest here radius

    atm address distance count

    ATM

    The result of above query in sent to user as follows:

    TABLE I. RESULT OF QUERY

    ATMs Address Distance Count

    ATM 1 Street No. 12 5km 4

    ATM 2 Street No. 16 12km 6

    ATM 3 Street No. 5 1km 2

    This query is a location dependent query that its responsedepends on the users location and his/her movement aftersending query; it means that the responses are changing byusers movement continuously. Fixed host first should ask thecurrent location of querys source from BS in order to respondto this query, so that it can send the result to the location of thatmobile unit. If during performing the transactions of that query,user moves from one cell to another cell, the BS in first cellshould modify the address of this mobile unit so that the resultof query can be send to its new address.

    Second step:After receiving the obtained results of queryby user, he/she can send a turn request in order to use givenATM according to his/her current location in proportion to thenearest ATM and the number of waiting people. Host (ATM)allocate the requested turn to user and sends it to user throughwireless network so that he/she would have its own turn andthen approach to given ATM and use it. Also host should save

    the password of a person who has requested turn accompaniedwith turn number in its database that it can performauthentication while using ATM by that user and makes surethat the turn number of a person who is using ATM reallybelongs to his/her and he/she has not used another personsturn. Authentication performs by accommodating a passwordwhich user enters when he/she uses ATM and a passwordwhich the host has saved while requesting turn in its database.

    Third step:When user reaches his/her given ATM, he/sheshould wait until his/her turn number is read by ATM, sohe/she can use ATM. ATM calls turn numbers sequentially andwait for each turn one interval period (e.g. 15 seconds). Ifgiven person does not refer to ATM in that period, it will callthe next turn number. If the user reaches given ATM late and

    his/her turn has been passed, he/she should send a new requestturn for that ATM device again. In fact in introduced approach,just for getting money, there is a need for ATMs and doingabove steps. Other bank operations like money transmission,bill payment, shopping services and etc. can be performedwithout requirement of ATM and through mobile unit andwireless connection with network.

    CONCLUSION AND FURTHER WORKS

    One of the requirements of electronic governments is toprovide and distribute smart cards for different applicationswhich cause each person should carry several and this issue canmakes problems that we have mentioned in this paper. Ourproposed method integrates the information of all the smartelectronic cards into a multipurpose smart SIM card. This SIMcard works based on mobile database architecture. Some of theadvantages of this method include not need to carry various

    smart electronic cards, not waiting in the queues of several cardreaders, ease of use, high availability and easily carrying. ThisSIM card also can be used as a driving license, passport,medical history, electronic election, fuel card, subway card andsome other cases.

    One of the main challenges of this plan is to provideappropriate telecommunications infrastructure in order topractical implementation and developed the multipurpose smartSIM card system. Of course, the authors in future work willcreate a lab environment to simulate and test multipurposesmart SIM card system. Other critical issues of this system iswarranty the reliability of wireless connections, securitymechanisms in order to prevent the penetration of hackers andillegal users that we can study these challenges in the future.

    Also the detailed studying of other aspects of using this method(e.g. using as medical applications, electronic election, drivinglicense, fuel card, etc.) can be a subject to future researches.

    REFERENCES

    [1] D. Barbara, Mobile computing and databases - a survey, IEEETransaction on Knowledge and Data Engineering, vol. 11, no. I, pp. 108-117, 1999.

    [2] A. Y. Seydim, M. H. Dunham, and V. Kumar, Location dependentquery processing, 2nd ACM International Workshop on DataEngineering for Wireless and Mobile Access, pp. 47-53, 2001.

    [3] M. H. Dunham and A. Helal, Mobile Computing and Databases:Anything New?, SIGMOD Record, vol. 24, no. 4, pp. 5-9, 1995.

    [4] J. Li, Y. Li, M. T. Thai, and J. Li, Data Caching and Query Processingin MANETs, Pervasive Computing and Communications, vol. 1, no. 3,pp. 169-178, 2005.

    [5]

    V. Kumar, Mobile Database Systems, NJ: John Wiley & Sons INC.,2006.

    [6] M. Tarafdar and M. S. Haghjoo, Location Privacy in ProcessingLocation Dependent Queries in Mobile Database Systems, 5 th IEEEInternational Symposium on Telecommunications, pp. 181-186, 2010.

    [7] W. Xinhua and L. Li, Location Dependent Continuous QueriesProcessing Model Based on Mobile Agent, 9th IEEE InternationalSymposium on Distributed Computing and Applications to Business,Engineering and Science, pp. 224-227, 2010.

    [8] S. lIarri, E. Mena, and A. Illarramendi, Location-Dependent QueryProcessing: Where we are and where we are heading, ACM ComputingSurveys, vol. 42, no. 3, pp. 1-73, 2010.

    [9] UNCTAD, Information Economy Report, United Nations, New Yorkand Geneva, 2005.

    [10] Department of Finance and Deregulation, National Smart CardFramework, Australian Government Information Management Office,

    2008.[11] 3GPP, 2005a, Specification of the Subscriber Identity Module - Mobile

    Equipment (SIM - ME) interface, 3rd Generation Partnership Project,TS 11.11 V8.13.0 (Release 1999), Technical Specification, 2005.

    [12] H. R. Firoozy-Najafabadi and S. Pashazadeh, Mobile Police in MobileGovernment, 5th IEEE International Conference on Application ofInformation and Communication Technologies, pp. 118-122, 2011.