Saturday, January 25, 2020

Role of Edutaintment for Safe Motherhood Education

Role of Edutaintment for Safe Motherhood Education THE PRACTICE OF SAFE MOTHERHOOD: CAN EDUTAINMENT BE THE WAY FORWARD? INTRODUCTION The Safe Motherhood concept was delivered worldwide to bring about reduction in maternal mortality. This concept has been successful to some extent but it has been discovered that Nigeria is yet to meet its 75% target of curbing mortality by year 2015 to its lowest ebb. Despite the Safe Motherhood initiative in Nigeria, pregnant and Post-partum women especially those in the rural communities still do not have a favorable disposition to practicing safe motherhood. This could be as a result of poor knowledge of these women about the concept of safe motherhood (Igbokwe and Adama, 2011). However, Mass Media as channels of mass communication is to inform, educate and persuade its audience to accept new ideas and technologies to enhance their living conditions. Edutainment is a form of communication used for the purpose of entertaining and education to create social change. Edutainment uses popular entertainment such as dramas, folklores, documentaries, talk shows and discussions to tackle social issues for the purpose of inciting change and promote positive attitude. Soul City Institute (2013) further defines edutainment as: any communication project that sets out to use popular culture to educate and challenge people. Edutainment is not a theory but a strategy to bring about individual and social change. It uses popular entertainment formats to tackle serious social issues in an innovative and entertaining way Singhal and Rogers (1999) points out that â€Å"Entertainment-through television, radio and music is one of the most effective communication strategies for reaching the public to promote family planning and other public health issues†. Therefore, mass media can shape health beliefs of people while promoting knowledge and awareness of health messages. The Mass media play a major role in peoples everyday lives. This is evident in how routine it has become to watch television, listen to the radio, surf the internet, and read newspapers and magazines. Television as a major tool of information dissemination and entertainment programs is a veritable tool for mass education. Since it is a visual medium, women can see examples of the various family planning methods available and safe health practices can be demonstrated during edutainment programmes. Also, television has the capacity to reach larger groups of women simultaneously thus, helping to facilitate and create awareness amongs t women on prevention and ways to handle health issues they are plagued with. STATEMENT OF THE PROBLEM Reduction in maternal deaths has become the major preoccupation of stakeholders in maternal health today as evidenced by its frequent appearance in most developmental objectives in the world today. It is also the 5th goal in the Millennium Development Goals (MDGs). World Health Organization (WHO) citing Graham indicates that the women dying are in their prime of life: they are crucial to society and the economy; they sustain the next generation; they make up more than half the workforce†. The discussion paper of Tinker et al (2000) reported that â€Å"womens low socioeconomic status and reproductive role expose them to risks of poor health and premature death†. They assert, further, that Womens reproductive biology, combined with their lower socioeconomic status, results in women bearing the greater burden from unsafe sex which includes both infections and the complications of unwanted pregnancy. Over the years, women in Nigeria and Africa, at large, have been plagued with health issues such as high mortality in childbirth. To combat maternal morbidity/mortality and other health issues that women face, there is the need for quality reproductive health services, such as medical care which includes family planning, safe pregnancy, delivery care, treatment and prevention of sexually transmitted infections, such as HIV and AIDS. Kalyani (2007) notes that while health issues on women are rampant and on the increase, the attitude of women towards seeking information on their health is low with little done in research about how women seek information pertaining to their health. Studies have revealed further that not all women understand and are able to process the health messages they come across. An example is the Findings from the National Adult Literacy Survey which indicate that â€Å"almost half of the U.S. adult population has limited literacy skills, and one-quarter is functionally illiterate†. Flores, Weber, Kilker, Dang and Lindsey (2007) observe that this is so as Health information often includes â€Å"technical terms and concepts that are hard to understand, regardless of ones level of education or literacy†. However, reading, understanding, and using health information can be a difficult task for those with limited literacy skills. Thus, the need for media programmes on health, as media cut across literacy level. To reduce these health challenges to their lowest ebb, television as a medium of entertainment and information seek to keep the ‘woman’ educated and informed. There is the need for media education on health a s a result of the complexity and population of the Nigerian society which health workers cannot handle alone. Objectives of the study The general objective of this study is to examine the extent to which edutainment programmes on the broadcast media have helped in promoting the practice of safe motherhood. Other objectives are: To determine if pregnant and post-partum women through Health edutainment programmes on the broadcast media have the knowledge of Safe Motherhood. To find out if pregnant and post-partum women practice the health messages on Safe Motherhood they watch or listen to. Research Questions To what extent do pregnant and post-partum women have the knowledge of Safe Motherhood as a result of health edutainment programmes on the broadcast media? What is the attitude of pregnant and post-partum women to the practice of Safe Motherhood? Scope of the study This thrust of this study is to investigate the extent to which edutainment programmes on the broadcast media have helped in promoting the practice of safe motherhood. This study will cover pregnant and post-partum women in Ilisan Community within the ages 15 to 49 years of age. Ilisan community is a town located in Ikenne Local government area of Ogun state. It is a community that has a number of her female populations is either illiterate or semi-literate. It is also a community that has a high rate of teenage pregnancy. LITERATURE REVIEW Safe Motherhood Geefhuysen (2000) defines Safe Motherhood as is the â€Å"culmination of services for women from the beginning of life and the ability to choose when to become pregnant†. The concept of safe motherhood includes taking necessary steps when preparing to get pregnant such as adequate preparation for the well- being of the mother and the growing fetus before conception and taking appropriate measures to ensure successful delivery. The purpose of Safe Motherhood initiative is to decide when to get pregnant through the use of contraceptive to promote family planning, prevent maternal mortality by saving for possible maternal emergency while receiving healthcare delivery service from a trained provider. This is affirmed by Igbokwe and Adama (2011) who pointed out that â€Å"safe motherhood is aimed at preventing maternal and prenatal mortality and morbidity. It also enhances the quality and safety of womens live through the adaptation of combination of health and non- health strateg ies† Maternal mortality The issue of maternal mortality has been a growing concern to world leaders and stakeholders in this field. â€Å"Maternal mortality is a single most important health issue facing obstetricians, gynecologists and Nigerians† (Society of Obstetric and Gynecology of Nigeria- SOGON). This problem arises from unequal power between men and women in sexual relationships which expose women to involuntary sex, unwanted pregnancy, and sexually transmitted infections including HIV and AIDS (Tinker, Finn and Epp, 2000). The world maternal ratio also necessitated the 5th Millennium Development Goals to have reduced maternal mortality ratio (MMR) by year 2015. The recent report by United Nations Fund for Population Activities UNFPA (2014) shows that: Globally, the maternal mortality ratio dropped by 45 per cent between 1990 and 2013, from 380 to 210 deaths per 100,000 live births. Worldwide, almost 300,000 women died in 2013 from causes related to pregnancy and childbirth. Maternal death is mostly preventable and much more needs to be done to provide care to pregnant women. Health Messages and Edutainment Programmes Yahaya, Fadairo and Ogunele (2009) explain that information, entertainment and education are very important to women. Therefore, health communicators should always include some elements of information, education and entertainment in their health and other development messages targeted at women in order to attract or gain their attention. They summarised from their study in Lagos that women experienced a serious improvement in knowledge and a positive change in their health behaviour as a result of watching and listening to various health programmes on Entertainment-Education channels. For instance, 61.2% indicated serious improvement in knowledge, while 59.8% had a positive change in their health behaviour due to programmes on family planning on television and radio respectively. Also Farhana Ahmed (2008), in their report, affirms that mass media techniques that combine entertainment with health education are particularly effective in producing behaviour changes. This they discovere d in their findings on a soap opera in Tanzania â€Å"Twende na Wakati† (Let’s Go with Times) â€Å"which has influenced about one- fourth of its listeners to adopt family planning methods and HIV/ AIDS prevention while 65.5% of the participants said they discussed pregnancy and maternal health issues after the campaign† Also, several studies, Singhal and Rogers, 1999; Brown and Singhal, 1999 and Tufte, 2002 point out that Entertainment-through television is one of the most effective communication strategies for reaching out to the public to promote social change. Singhal and Rogers (1999) also notes that television soap operas, popular music, street theatre and comic books have all been used to educate the public about such health issues as family planning, HIV and AIDS prevention, environmental health, female equality, improved sanitation, female genital mutilation (Singhal, Rogers, 1999). Findings from their study showed that entertainment-education in developing countries confirm that the strategy changes behavior. Methodology Design: The structured questionnaire for the survey was designed in English but the data collectors were trained to interpret the questions in the local dialect. The design is considered appropriate because the study will essentially focus on people. Setting: The study was carried out in Ilisan Remo, Ogun State. Ilisan is a community located in Ikenne local government area of the state. It has a primary health care center, a teaching hospital owned by Babcock University and a few other privately owned hospitals that provide medical care. Ilisan also have a couple of Traditional Birth Centers which a great number of pregnant women visit. Procedure: a total of 110 copies of the questionnaire were distributed. The copies of the questionnaire were administered at homes, shops, the market place, private offices, hospitals, institutions, churches and mosques. 100 were returned and analysed using descriptive statistics such as frequency tables and percentages. Brown, W. and singhal, A. (1999) Entertainment-Education Media Strategies for Social Change Promises and Problems. In Demen, D. and VIIInnmath, K. (ed.), Mass Media Social Control and SocIal-Amea. Iowa: Iowa State Univenity Press. Retrieved from http://utminers.utep.edu/asinghal/Articles%20and%20Chapters/singhal_usdin_scheepers_goldstein_japhet.pdf Farhana, S. Ahmed, J. (2008).Entertainment-Education to Promote Safe Motherhood: In the Context of Bangladesh. Canadian Social Science 4(4). Canadian Research Development Center of Sciences and Cultures. Retrieved from http://www.questia.com/read/1P3-1584808581/entertainment-education-to-promote-safe motherhood Flores, L., Weber, K, Kilker, P., Dang, P. Lindsey, L. (2007). Health Education Efforts in Uncertain Times: Helping to Ensure Healthy Pregnancies in a Time of Crisis. American Journal of Health Education. Vol 38(4). Gale Group Geefhuysen, C. (2000) Safe Motherhood in Indonesia: A Task for the Next Century. In: Berer, M. and Ravindran, S. (ed.) Safe Motherhood Initiatives: Critical Issues. Retrieved rom http://www.rhmjournal.org.uk/publications/SafeMotherhood.pdf Igbokwe, C. and Adama, G. (2011) knowledge and practice of Safe Motherhood among childbearing mothers Attending maternal and child health (mch) Clinics in nsukka health district. Journal of Research in Education and Society Vol.2(1). Retrieved from http://www.icidr.org/jres_v2nos1_april2011/Knowledge and Practice of Safe Motherhood Initiative (SMI) among Childbearing Mothers attending Maternal and Child Health (Mch) Clinics in Nsukka Health District.pdf Kalyani, A. (2007). Information-Seeking Behavior of Women in Their Path to an Innovative Alternate Treatment for Symptomatic Uterine Fibroids. Journal of the Medical Library Association, 95(2): 164-172. Retrieved from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1852624/ Soul City Institute (2013) Edutainment: Using stories media for social action and behaviour change. Retrieved from http://www.google.com.ng/url?sa=trct=jq=esrc=ssource=webcd=2ved=0CCIQFjABurl=http%3A%2F%2Fwww.soulcity.org.za%2Fresearch%2Fpublished-articles%2Fedutainment-using-stories-and-media-for-social-action-and-behaviour-change%2Fdownloadei=VnP9VNuaI8vfapqSgYAOusg=AFQjCNFzf-ESEywiAXHtnk-_U6bJe_jkAAsig2=QdJ7fbpcrFiNaSEMB4mSNQbvm=bv.87611401,d.d2s Singhal, A. Rogers, E. (1999). Entertainment-Education: A Communication Strategy for Social Change. Mahwah, NJ: Lawrence Erlbaum Associates. Retrieved from http://www.questia.com/read/57758858/entertainment-education-a-communication strategy SOGON, (N/A).Fact Sheet on Reproductive Health in Nigeria: Facts and Figures. Tinker, A., Finn, K. Epp, J., (2000). Improving Women’s Health Issues and Interventions. Health, Nutrition, and Population Family (HNP). The International Bank for Reconstruction and Development / The World Bank. Washington, DC 20433 Tufte, T. (2002) Edutainment in HIV/AIDS Prevention. Building on the Soul City Experience in South Africa. In: Servaes, J. (ed.), Approaches to Development Communication, Paris: UNESCO. Retrieved from http://www.unesco.kz/publications/ci/hq/Approaches%20Development%20Communication/CHP13.PDF UNFPA (2014). The Millennium Development Goals Report. Retrieved from http://www.un.org/millenniumgoals/2014%20MDG%20report/MDG%202014%20English%20web.pdf WHO (World Health Organization) (2013, February 6-7). Meeting to Develop a Global Consensus on Preconception Care to Reduce Maternal and Childhood Mortality and Morbidity. A Meeting Report presented at the World Health Organization Headquarters, Geneva. Retrieved from http://www.who.int Yahaya, M., Fadairo, S and Ogunele, A. (2009). Attitude and the Effect of Health-based Entertainment-Education Strategies on the Knowledge and Behaviour of Women in Lagos State. International Journal of Agricultural Economics Rural Development 2 (1): 2009. Retrieved from http://www.ijaerd.lautechaee-edu.com

Friday, January 17, 2020

Sms Banking

Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India [email  protected] com Abstract— M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services.Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain te xt form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost.In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2].Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, i t is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability.Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking.Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objec tive is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into t he GSM standard for support of transmitting information over the signalling channels of the GSM network.USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumer’s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumer’s mobile banking menu within the SIM card. STK is the most secure method of mobile banking.It allows the bank to load its own encryption keys onto the SIM card with the bank’s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily ha cked by any hacker or seen by anyone from message inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired tra nsaction. Device constraints raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techn iques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message ServiceShort Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and /or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customer–side mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuou sly. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original sender’s address by altering respective field in origin al SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fields’s to accommodat e for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fields’s as shown in above figure.Account Number: – It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: – It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted ses sion keys stored in file, which will be stored on customer handset. ISSN : 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: – This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: – Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found, it will send message â€Å"Wrong Account Number† to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message â€Å"Wrong Pin Number† to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side â€Å"Fake Transaction† and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framewor k and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm don’t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation propert y of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side applicati on. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â€Å"Mobile banking Services in bank area†, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,†Spanish Mobile Banking Services: An Adoption Study†, Proceedings of the International Conference on Mobile Business 2005.Mohammad Shirali-Shahreza,†Improving Mobile Banking Security Using Steganography â€Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,†Mobile Banking Services Based On J2ME/J2EE†, CADSM’2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,†Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literature†, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,†Secure end-to-end mobile payment System†. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,†MMPS: A Versatile Mobile-to-Mobile Payment System†, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,†An Efficient Steganography Scheme for M- Commerce†. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, †Text Steganography in SMS†, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, †Secure Display and Secure Transactions Using a Handset†, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, â€Å"A Novel Security Mobile Payment System Based On Watermarked Voice Cheque†. M. Shirali-Shahreza, â€Å"Stealth Steganography in SMS†, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, â€Å"Security of Mobile Banking†. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud ,† Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types†, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,† Implementation of LSB Steganography and its Evaluation for various bits†. ISSN : 0975-4024 Dec 2011- Jan 2012 479 Sms Banking Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. And Technology, Nagpur, India [email  protected] com Abstract— M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services.Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain te xt form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost.In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2].Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, i t is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability.Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking.Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objec tive is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into t he GSM standard for support of transmitting information over the signalling channels of the GSM network.USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking.The consumer’s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumer’s mobile banking menu within the SIM card. STK is the most secure method of mobile banking.It allows the bank to load its own encryption keys onto the SIM card with the bank’s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily ha cked by any hacker or seen by anyone from message inbox.Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired tra nsaction. Device constraints raise the questions as to whether there will be adequate security for users without compromising the ease of use and speed.Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techn iques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message ServiceShort Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM).Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks.An SMS Gateway allows interfacing software applications to send and /or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile.Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database.Bank sends Customer–side mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuou sly. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server.Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner.We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original sender’s address by altering respective field in origin al SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available.V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation.Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fields’s to accommodat e for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fields’s as shown in above figure.Account Number: – It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: – It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted ses sion keys stored in file, which will be stored on customer handset. ISSN : 0975-4024Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: – This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: – Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS.MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS.After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset.Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message.Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer.Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number.If match is not found, it will send message â€Å"Wrong Account Number† to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message â€Å"Wrong Pin Number† to customer handset.Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side â€Å"Fake Transaction† and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset.VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framewor k and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server.Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm don’t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation propert y of encryption.Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed.This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance.This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system.The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB.Net server side applicati on. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out.Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â€Å"Mobile banking Services in bank area†, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,†Spanish Mobile Banking Services: An Adoption Study†, Proceedings of the International Conference on Mobile Business 2005.Mohammad Shirali-Shahreza,†Improving Mobile Banking Security Using Steganography â€Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,†Mobile Banking Services Based On J2ME/J2EE†, CADSM’2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,†Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literature†, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,†Secure end-to-end mobile payment System†. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,†MMPS: A Versatile Mobile-to-Mobile Payment System†, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,†An Efficient Steganography Scheme for M- Commerce†. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, †Text Steganography in SMS†, 2007 International Conference on Convergence Information Technology.Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, †Secure Display and Secure Transactions Using a Handset†, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, â€Å"A Novel Security Mobile Payment System Based On Watermarked Voice Cheque†. M. Shirali-Shahreza, â€Å"Stealth Steganography in SMS†, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006.Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, â€Å"Security of Mobile Banking†. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud ,† Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types†, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,† Implementation of LSB Steganography and its Evaluation for various bits†. ISSN : 0975-4024 Dec 2011- Jan 2012 479

Thursday, January 9, 2020

My First High School Science Teacher Essay - 1152 Words

I have always been curious about the natural world, as a child, I would ask my parents why wood burns and doesn’t melt, or simply why the sky was blue. Mrs. Hardtke, my first high school science teacher, asked us on the first day of class to venture outside, and ask questions about anything and everything we saw. She was an inspiring teacher, and she lead me to realize that in studying science, I could answer the questions I so often had about the world. Within my time here at the University of Washington, it wasn’t easy to look past the lack of female mentors within the chemistry department and having initially been so motivated by Ms. Hardtke made this transition difficult. However, instead of being discouraged by this, I found myself determined to become a successful female biochemical researcher and I discovered great strength in the thought that one day I could become a mentor for a young woman much like myself. My determination and innate sense of exploration in s cience is manifested in my research with Dr. Alshakim Nelson today, and will undoubtedly help me to succeed in graduate school. My responsibility while researching with Dr. Nelson has been to characterize the self-assembly of the triblock-copolymers our group has generated. The copolymers form hydrogels in solution, and are dual stimuli-responsive to both shear and temperature, making them ideal for 3D bio-printing. The copolymers self-assembly in solution is important in understanding the hydrophobic andShow MoreRelatedMy First Year Of Science868 Words   |  4 Pages My science journey started around fourth grade. The readings and activities introduced us to science. From what I can remember in fourth grade the teacher had a great balance of between lecturing and activities. My first year of science was not wonderful or bad, rather just ok. One influence that media portrayed about science when I was a child was that liking science was nerdy. That year was filled with little â€Å"experiments† here and there, and that to me was ok. However, it seemed that each yearRead MoreEssay About My Education723 Words   |  3 PagesMy education has always been extremely important to me. For most of my time at school I have challenged myself and enjoyed myself. Through my time at school I have found I am completely motivated to work and get things done when I am challenged or when I am interested by what is being taught. I will strive to be one of the best at what I do in college. I believe this mindset I have is created by my want for new knowledge. I have had this mindset for most of my life and it wont change, which I believeRead MoreHigh School Agricultural Science Teacher1056 Words   |  5 Pagesa future high school agricultural science teacher, I have put quite a bit of thought into what resources will make me the best teacher I can be. Of course there are many websites, books, and workshops that I can use as resources. However, I think my best opportunity comes from current and former teachers. Who better to learn from than those that have already dedicated many years to the fiel d of education? The first teacher I interviewed was my high school agricultural science teacher, Kevin WunderlichRead MoreImportance Of My High School Experience815 Words   |  4 Pagesgood about school because I have good grades in all my classes. What shaped my high school experience was shaped by my teachers and my friends. My high school experience is good so far because I made friends that are good friends to me and they help me when I need it. Elementary school was good for me because I did not know much English ,and all my teachers and friends helped me speak English. The factors that shaped me the most as a student are my teachers and family. All the teachers I had allRead MoreMy Teacher As A Good Teacher846 Words   |  4 PagesWhen my teacher assigned our new essay, I felt as this one might be a bit of a struggle. I was too busy worrying about my SAT and I kept having second thoughts about what I planned to do. Then, I remembered how terrible my school teachers were and decided why not just write about that. Throughout my school life I’ve encountered many teachers who I would consider to be bad teachers. I find it funny how some people only become teachers, so they can get an easy paying job. A bad teacher is someone whoRead MoreAsian, Female, and the Middle Class1385 Words   |  6 Pagesintroduce themselves, they first talk about their identities because people’s identities determine what kind of peo ple they are. For me, I am an Asian, I am a female, and I am a member of the middle class. Although people sometimes share categories of identity, their perceptions of their identities are formed in different ways. My life and education have shaped my understanding of my identities which, at same time, influences the way I perceive my life and education.    My race as Asian is one bigRead MoreScience And Science Of Science847 Words   |  4 Pages It’s crazy to think my science education began over 15 years ago. Science has played a role in my life for as long as I can remember. My first memories of science began with me playing in the dirt, picking flowers for my mom and chasing butterflies. I remember picking raspberries in the backyard, keeping a ladybug as a pet, and the long days at camp spent fishing and hunting with my dad. On the contrary, the start of my science education also included some negative experiences. I got stung by aRead MoreGraduation Speech : My Experience877 Words   |  4 PagesMy experience in education from kindergarten to being a senior in high school was very challenging but rewarding. Throughout my schooling, I was blessed to have some exceptional teachers and coaches that had taught me life lessons and challenged me to be a better person outside the classroom and a better student in the classroom. From kindergarten to being a senior in high school, I attended three different types of scho ols in the South Carolina School system. I attended a small private ChristianRead MoreWhy I Am A Teacher902 Words   |  4 Pages Science is the exploration of discovering life and the impact it has on people and the atmosphere. All around us is the opportunity to learn daily about something related to the field of science and how it impacts us and our surroundings. In my autobiography I will share with you my journey in learning and experiencing science in my personal life. I hope that my experiences and perspective on teaching sciences and discovering it will guide me and help me as I become a teacher myself. I believeRead MoreJourney From Failure - Original Writing991 Words   |  4 PagesJourney from failure I got into a lot of problems as a child in the early years of my life and those problems only got bigger and continued to in large day by day. So this all comes down to kids needing to be listened to or you’re going to have a lot of problems with your child, because I was not listened to. I ended up having serious problems in school. This is a little story on how I overcame my failure at life and began to be listen to. November 15, 2009 I’m back in the principal’s office, back

Wednesday, January 1, 2020

Essay Jane Eyre As A Modern Woman - 778 Words

Jane Eyre as a Modern Woman nbsp;nbsp;nbsp;nbsp;nbsp;Throughout the course of Charlotte Bronte’s novel, Jane Eyre, Jane is used as a representation of a modern woman. Jane does many things which women of her time didn’t do. She started reading as a little girl. This was a talent that most women at the time didn’t acquire throughout their entire lives. She learned how to write, also. This, too, was a skill most women of that time did not possess. Perhaps the biggest reason why Jane is a modern woman is because she takes matters into her own hands. She is in complete control of her life and her destiny. Most women of that time were completely dependent on their husbands for everything. Jane Eyre represents Charlotte Bronte’s idea of†¦show more content†¦nbsp;nbsp;nbsp;nbsp;nbsp;Next, Charlotte Bronte shows that Jane represents her idea of a modern woman because she can write. Most women of that time would spend their time sewing or housekeeping, but not Jane. She learned how t o write at school, and she wrote instead of sewing and housekeeping. For example, Jane uses her writing to better her life. She does this by writing an advertisement which states she’s a governess and she gets a new job at Thornfield. â€Å"With earliest day, I was up: I had my advertisement written, enclosed, and directed before the bell rang to rouse the school...nearer to my own age.--89† Another example of Jane’s writing was when she was a student at Lowood. She explains that she was writing and figuring out sums on her slate before she dropped it. â€Å"One afternoon (I had then been three weeks at puzzling over a sum in long division,...they thus greeted.--64† This is another way Charlotte Bronte shows that Jane is her idea of a modern woman. nbsp;nbsp;nbsp;nbsp;nbsp;Finally, Charlotte Bronte shows that Jane represents her idea of a modern woman because she is independent. This is the main reason why Jane is a modern woman. Unlike other women, she’s not dependent on a man to provide for her. She provides for herself because she is a modern day working woman. Back then, it was almost impossible to find a workingShow MoreRelatedHow Does Jasper Fforde s The Eyre Affair Testify?1419 Words   |  6 PagesHow does Jasper Fforde’s The Eyre Affair testify to the importance of reading in the formation of one’s self-identity? Many aspects contribute to the formation of a person’s self-identity. Whether it be their surroundings, their culture, their language, or even other’s personal identities, they all shape one’s perception of the world, the self-imposed rules surrounding them, and where they believe they belong within it. This world is encompassed with stories, and they contribute to the fabricationRead MoreJane Eyre Essay1323 Words   |  6 Pagesâ€Å"I am no bird; and no net ensnares me; I am a free human being with an independent will.† (Bronte, Jane Eyre). This quote expresses Charlotte’s beliefs on women’s equalities. Charlotte Bronte was born in 1816. She was one of six children and lived in Yorkshire County England. She first worked as a governess in the Sidewick family then in the White family for only nine months. Charlotte wanted more for herself, and none of her jobs satisfied her ambitions. When she moved back home, she discoveredRead MoreJane Ey re By Charlotte Bronte1601 Words   |  7 Pagesfinancial prospects or social standing matter in a modern feminist perspective? If she could speak, a modern feminist’s beliefs would likely shock her, so to interpret this novel as feminist, one must see it through the lens of the time and place Brontà « wrote it. Charlotte Brontà «Ã¢â‚¬â„¢s Jane Eyre was a feminist work in that Bronte expressed disdain for oppressive gender structures through the voice of Jane Eyre, and the actions of Bertha Mason. Jane Eyre was a steamy novel for its time, with imagery asRead MoreEssay on Criticisms of Jane Eyre1615 Words   |  7 PagesCriticisms of Jane Eyre The major criticisms of the novel in question to be the melodrama used by the author and the wickedness of character shown in Jane and Mr. Rochester. While most critics admired the style of writing and truth of character portrayal, they did not admire the improbability of circumstances or the characters portrayed. Elizabeth Rigby (later Lady Eastlake) was probably the harshest critic, calling Jane Eyre â€Å"the personification of an unregenerate and undisciplinedRead MoreComparing Wide Sargasso Sea and Jane Eyre Essay1325 Words   |  6 PagesWide Sargasso Sea is an interesting relation to Jane Eyre. The female character of Jane Eyre forms into a furiously, passionate, independent young woman. The female character of Jean Rhys’s illustration is a character that Jane will know further on as Rochester’s crazy wife who is bolted in an attic. Jean Rhys further studies this character, where as Charlotte Bronte approved that it was left explained (Thorpe 175). Antoinette, considerably like Jane, evolves in a world with minimal amount of loveRead MoreComparison of Charlotte Brontes Jane Eyre and the DH Lawrences Horse Dealers Daughter1260 Words   |  5 Pagesï » ¿Women as Outsiders: A Comparison Of Jane Eyre and The Horse Dealers Daughter Women are often portrayed as a marginalized other or outsider in literature, reflecting the degree to which they are outside the traditional patriarchal concepts of authority and power as well as (for much of Western history) outside the practical and legal means of self-sufficiency and self-direction. As the times have shifted, the particular perspective and definition of women as outsiders has also changed, asRead MoreJane Eyre : A Fight For Women s Equality1749 Words   |  7 Pages Jane Eyre: A Fight for Women’s Equality Feminism: the doctrine advocating social, political, and all other rights of women equal to those of men (dictionary.com). Throughout history, women have fought for and struggled with gaining full and absolute equality in society--which has proven to be difficult in the long-cultivated patriarchal society that we still live in today. In modern times, women continue to be paid less than men, are vastly underrepresented, and face many forms of violence aroundRead MoreThe Pursuit of Human Freedom in Kate Chopin’s The Awakening and Charlotte Brontà «Ã¢â‚¬â„¢s Jane Eyre1749 Words   |  7 PagesIn Kate Chopin’s The Awakening and Charlotte Brontà «Ã¢â‚¬â„¢s Jane Eyre, one of the most prevalent and recurring themes and ideas relates to human freedom. The main characters in the two novels, Edna Pontellier and Jane Eyre, both long for social, religious, and sexual emancipation among other things – freedom from the constraints of Victorian society, which have rendered them dependent and inferior to men. While it is true that both protagonists of their respective novels wanted emancipation, their livingRead MoreJane Eyre s Inner Conflict884 Words   |  4 PagesJane’s Inner Conflict In the novel Jane Eyre, Jane is often taken forced to make life changing decisions. Her decisions not only affect her own life and those around her, but also provide a model of a modern woman who is free from the social expectations for women living in her era. From a young age, Jane was taught the mindset that she must be independent and fight for her place. She was neglected as a child while living at Gateshead and often left to fend for herself. She was frequently lockedRead MoreTrapped in the Red Room: A Look into the Mind of the Original Mrs. Rochester1399 Words   |  6 PagesMrs. Rochester â€Å"One is very crazy when in love† (Freud). Freud made this statement nearly one hundred years ago. As one of the founders of modern psychology what would he have to say about the mad woman in the attic? Was she mad, in love, suffering from hysteria, or simply a product of nature versus nurture? Neither of which were very kind to her. In Jane Eyre we as the readers are presented with a singular perspective in nearly true to form autobiographical narrative. From Jane’s viewpoint and from