Monday, August 24, 2020

To what extent does political participation reflect a bias in favor of Essay

What exactly degree does political interest mirror a predisposition for the favored - Essay Example This is especially reflected in political support. Intrinsic Inequality Ideally, political exercise is available to all. The constitution and the aggregate laws of any popularity based government guarantee this. Here, the vast majority are qualified to look for open office or be associated with choosing individuals for open positions. For certain networks, even the individuals who don't have the foggiest idea how to peruse and right are not rejected to take part. Lamentably, the appointive procedure in popular governments today is portrayed by rivalry, wherein political investment is â€Å"circumscribed by inconsistent access to the two assets and the dynamic process.†1 Equality would have been simpler to rehearse in the brand of direct majority rule government embraced in Greece, wherein all residents are entitled a voice in policymaking. In any case, the situation today †one about political support through portrayal †is profoundly unique. The guidelines and element s of picking delegates are no longer as clear as those before. Assets are required so as to get spoke to and this perspective inclines the equalization to the individuals who have more than others. This is featured by the prevalence of people and private endeavors in political activities with their ability to impact all arrangement systems. Elitism In the United States, political portrayal is particularly one-sided towards the tip top. The way where people are chosen, exhibits a procedure wherein the special appreciate outrageous favorable position. For instance, there are no laws that direct private consumptions for divided political purposes. The framework right now treats private subsidizing in the American decisions as a feature of the populist estimation of opportunity to help the up-and-comer of one’s decision. The contention is that when one confines the utilization of cash, it is equivalent to limiting the rights to freedom and free discourse. This is exhibited in the manner applicants in the US can purchase publicizing broadcast appointment in the media. Private cash in this example is converted into a significant political asset, seriously disadvantaging those people and gatherings that don't have the methods or can't bring them up in time. Chapman characterized the advantaged between the financial world class and the political first class. She clarified that the last tend be commanded by the previous and that in most probability property, salary, occupation and instruction are those that would render individuals from this class bound to enter politics.2 Another variable that underscore the inclination of the current vote based political cooperation in the US is the moderate view on legislative issues. This is showed best by the American Electoral College framework, wherein well known vote is ignored for specific gatherings and people. The Founding Fathers of the American Constitution were known to have noticed the flightiness and narrow-minde dness of the majority and, consequently, depended the ability to choose the American President in the possession of the educated and the proficient. This is legitimized, composed Sullivan, Piereson and Marcus, by the possibility that general change of human instinct is an excessive amount to expect and that political portrayal ought to be offered uniquely to the idealistic or the â€Å"more exceptionally instructed and increasingly capable fragments of the public.†3 And so when Al Gore won the well known political race, George W. Shrub was chosen

Saturday, August 22, 2020

Population Explosion in India Essay

Populace blast is a difficult which is looked by the nation at a disturbing state. The path at which the number of inhabitants in the nation is expanding is a reason for concern thus me of the reasons for populace blast are: High birth rate which is brought about by: Universal marriage framework where everybody essentially needs to get hitched in the nation. Early marriage where the normal period of marriage is incredibly low when contrasted with different nations of the world. Lack of education is a difficult which is confronting the nation and the low proficiency rates lead to conventional, odd and uninformed populace. Destitution is another issue which faces the nation and should be comprehended. Needy individuals are uneducated and consider a to be as a â€Å"gift of God† which in a roundabout way prompts populace blast. Tropical atmosphere of the nation prompts young ladies and young men achieving adolescence at an early age which is additionally one reason for an enormous populace. The joint family framework additionally prompts a division of financial duties among everybody in the family which prompts Women are given a low status in the general public and are viewed as an individual for cooking and bringing forth and are not allowed to support their privileges. Alongside this the diminishing demise rate is additionally one reason for populace blast. India’s populace has just crossed the billion imprints. Hence, the nation having just on 2. 4 percent of globe’s region has come to hold 16 percent of globe’s individuals. Its present yearly increment at 16 million is the most noteworthy on the planet. Before long we may accomplish the questionable differentiation of turning into the most crowded nation on the planet. The discussion about populace blast in India is currently over 50 years old. It gained another point of view when the 2000 National Population Policy (NPP) was drafted. There was a stamped move from the objective situated methodology of the 70? s and 80? s to the one that imagined the ‘development is the best pill’ viewpoint. The socioeconomics specialists, women’s gatherings, wellbeing associations, social activists and academicians had the option to persuade the policymakers that so as to accomplish the socio-segment objectives of the decrease of disparities, arrangement of training, administrations and formation of mindfulness were to be taken on a need. The fundamental driver of enormous size and high development of populace can be extensively sorted into social and monetary causes which are as beneath: I) Marriage is practically inescapable among people; (ii) Motherhood is about widespread among hitched ladies; (iii) The custom of early marriage followed since numerous hundreds of years has encouraged a more extensive scope of conceptive period; (iv) The Net Production Rate (NPR) is more prominent than one, which implies that ladies supplant themselves by bringing forth more than one little girl which prompts steady ascent in birth rate; (v) Wideâ ¬spread absence of education among individuals, particularly lady is likewise a significant contributor. It has been demonstrated that there is an immediate connection among lack of education and fruitfulness; (vi) Superstitious convictions and fantasies that a male kid is an absolute necessity for salvation, government managed savings and continuation of the family tree; and (vii) Misconceptions that the utilization of contraception estimates lead to sicknesses, imperfections or general shortcoming. The financial causes incorporate (I) Children are viewed as an advantage not a risk by the poor who see them as wellspring of salary; (ii) Statistics additionally demonstrate that the money saving advantage proportion for a youngster is great for poor people; (iii) Lack of appropriate clinical offices and high death pace of baby to need more kids; and (iv) There is likewise absolute absence of monetary security for widows and older individuals which causes individuals to go for kids as financial security. There are different reasons which can't be delegated either social or monetary reasons like absence of appropriate family arranging strategies and offices, high birth rate and low demise rate. Overpopulation has extensive results on each part of life of a nation. These results should be concentrated long before we can discover fitting measures to stem the root. Overpopulation prompts as well as sustains destitution. The business analysts are of the supposition that there are four principle factors that make a nation rich or poor: 1. National variables like area highlights and mineral assets accessible in the nation. 2. Authentic variables, I. e. regardless of whether a nation has stayed a province of some other nation and has endured long monetary abuse, e. g. India under British standard. 3. Segment factors, I. e. the size and development of populace. 4. Financial variables, I. e. accessibility of capital, innovation, framework, and so forth. The segment factors accept more noteworthy significance since common variables stay consistent and history can't be changed. The enormous size of populace implies work of lion’s portion of the assets for the creation of merchandise for the fulfillment of the fundamental needs of food, garments and sanctuary. The high pace of development of populace implies proceeding with extra weight on these assets. It is just because of ominous segment factors that poor nations stay in unending neediness. The per capita salary which is the pointer of extravagance of a nation doesn't increment even with an expansion in all out pay in light of the fact that the populace which is a divisor in this condition additionally increments. The financial experts insist that the definite route for a poor nation is to expand its beneficial limit by creating increasingly capital merchandise like apparatus. Be that as it may, as the overpopulated nations need purchaser products in huge amounts to fulfill people’s needs it gets hard for them to utilize their assets for the delivering ‘producer’ merchandise and in this way they stay under the endless loop of destitution. Another disadvantage of populace blast is that it makes all arrangements made for improvement of the nation go haywire. Our own nation made a self-sufficient Planning Commission and began a progression of Five-Year Plans from the year 1951-52. Be that as it may, we have not had the option to bring quick advancement in light of the fact that our populace which was 36. 1 crore in 1951 has developed around multiple times today at approx. 108 crores. Normally any advancement plan made for one individual can't be sufficient for three. The age arrangement of our populace is additionally not great. It has been discovered that the working age bunch comprises 60% of the absolute populace falls in the needy age gatherings of a high reliance proportion of 67% determined as follows: If we consider the joblessness masked joblessness and semi joblessness into factor this would introduce a gloomier image of our economy. Even more, on the off chance that we look at that as a high bit of the individuals who are occupied with some sort of work or the other are not actually prepared and fall in the classification of incompetent work, we will understand that our gainful limit is very low. Under such conditions a high development of populace adds to the weight of our economy. The huge size of populace additionally adversy affects our normal assets. Coal, oil, gaseous petrol, minerals and woods are by and large exorbitantly used to set up more ventures to make different consumable articles to fulfill ever-expanding needs. As these assets are constrained and modest, they have been waning so definitely that soon they would debilitate totally. Woods are being cleared to carry more land under development to give food to expanding populace and to make more settlements for their living. Consuming of non-renewable energy sources in industrial facilities, vehicles and family units has made another hazard of natural contamination. Injudisions utilization of water assets like waterways like, lakes, wells, streams and even seas has caused water contamination. Numerous sicknesses have emerged to harrow people and influence vegetation for what it's worth, the deforestation is probably going to proceed with unabated which would additionally disturb the issue. One more issue is the movement of rustic individuals to urban regions looking for better acquiring chances. The insights show a disturbing increment of 57% from 34% after freedom. The swarming of urban regions request more foundation, city administrations, transport, wellbeing, sanitation and instructive offices giving which isn't just a difficult undertaking yet additionally implies an extra weight on the effectively lacking monetary assets. As the adjustment of populace is the most noteworthy assignment in front of us, tough measures are required toward this path. A few nations have looked to authorize legitimate solutions for this constant disease. For instance, China has applied the one youngster standard lay law. Some Indian states have banned the up-and-comers having multiple youngsters from any political race. Such exacting measures may work however their symptoms may exceed their advantage to society and nation. We have to address the issue of overpopulation in the more extensive sense and in a socially controlled manner. This a be finished by making mindfulness among individuals and giving them the necessary methods. India’s populace has just crossed the billion imprints. In this way, the nation having just on 2. 4 percent of globe’s zone has come to hold 16 percent of globe’s people. Its present yearly increment at 16 million is the most elevated on the planet. Before long we may accomplish the questionable differentiation of turning into the most crowded nation on the planet. The discussion about populace blast in India is presently over 50 years old. It procured another point of view when the 2000 National Population Policy (NPP) was drafted.

Saturday, July 25, 2020

Goldilocks and the n HASS classes

Goldilocks and the n HASS classes So while I like to pretend that I dont procrastinate sometimes, up until today, Ive procrastinated about selecting a HASS class for next semester. Unfortunately this semester, I left the selection of my HASS class to last, so I have to find one that fits my schedule instead of really being able to just select a class I want to take just like I select my other classes. After using the search tool online, I managed to come up with 179 results, and Ive since filtered that list down to just a couple. My approach to selecting a HASS class is that I want to take a class on material that sounds interesting. Some students like to select easy classes, and I think classes are easier when you are interested in the material and can therefore contribute and participate more. A few weeks ago, Mitra, also highlighted some cool classes next semester in her blog, and since Mitra is just so cool, those classes that also appear in my list will be marked with an (M). Here are the classes; let me know what you think! 11.002J Fundamentals of Public Policy Provides an introduction to policy-making. Explores policy questions from the perspective of different focal actors, including administrative agencies, citizen and interest groups, and the media. Examines the interplay between policy development and institutions, and reviews normative and empirical models of policy-making. Considers the significance of the democratic context for policy-making. Primary focus on domestic policy. 11.017 Urban Space and Society (M) Focuses on how the spaces of the modern city relate to its social life. Explores six conditions of urban space: the positive aspects of density; the qualities of liveliness; the distinction between borders and boundaries; the dilemmas of security; the problems of monotony and repetition; the nature of complexity and mixed use. Relates these conditions to sociological analyses and debates about crowding, impersonality and community, segregation, the operations of power, networks and personal freedom in the city. Combines lectures on social theory with field-work in which students illustrate a spatial-social issue photographically and discuss the result. 14.41 Public Finance and Public Policy (M) Explores the role of government in the economy, applying tools of basic microeconomics to answer important policy questions such as government response to global warming, school choice by K-12 students, Social Security versus private retirement savings accounts, national versus price controlled health insurance, setting income tax rates for individuals and corporations. 24.263 The Nature of Creativity Introduction to problems about creativity as it pervades human experience and behavior. Questions about imagination and innovation studied in relation to the history of philosophy as well as more recent work in philosophy, affective psychology, cognitive studies, and art theory. Readings and guidance with students focus of interest. 24.264 Film as Visual and Literary Mythmaking Problems in the philosophy of film as well as literature studied in relation to their making of myths. Readings and film that draw upon classic myths of the Western world. Emphasis on meaning and technique as the basis of creative value in both media. 21M.604J Playwriting I Introduces the craft of writing for the theater. Through weekly assignments, in class writing exercises, and work on a sustained piece, students explore scene structure, action, events, voice, and dialogue. Examine produced playscripts and discuss student work. Emphasis on process, risk-taking, and finding ones own voice and vision. 21W.732 Introduction to Technical Communication Subject focuses on various forms of technical and scientific writing, including special problems in organizing and presenting technical information and writing for different audiences and purposes. Frequent writing assignments, regular revisions, and short oral presentations are required. Readings and specific writing assignments vary by section. See subjects URL for enhanced section descriptions. Emphasis is on developing students ability to write clear and effective prose. Students can expect to write frequently, to give and receive response to work in progress, to improve their writing by revising, to read the work of accomplished writers, and to participate actively in class discussions and workshops. 21W.778 Science Journalism An introduction to print daily journalism and news writing, focusing on science news writing in general, and medical writing in particular. Emphasis is on writing clearly and accurately under deadline pressure. Class discussions involve the realities of modern journalism, how newsrooms function, and the science news coverage in daily publications. Discussions of, and practice in, interviewing and various modes of reporting. In class, students write numerous science news stories on-deadline. There are additional longer writing assignments outside of class. STS.002 Toward the Scientific Revolution The emergence of Western science: the systematization of natural knowledge in the ancient world, the transmission of the classical legacy to the Latin West, and the revolt from classical thought during the scientific revolution. Examines scientific concepts in light of their cultural and historical contexts. 21H.206 American Consumer Culture Examines how and why twentieth-century Americans came to define the good life through consumption, leisure, and material abundance. Explores how such things as department stores, advertising, mass-produced cars, and suburbs transformed the American economy, society, and politics. Many of you may have questions about HASS classes, so if you do, please email me with questions or post a comment. To date, Ive taken 6 HASS classes, and I dont plan on stopping after the required 8. And also, if you have any questions in general, dont hesitate to ask. Incoming freshmen want to know what to pack, how to eat for cheap, etc, let me know!

Friday, May 22, 2020

A New High for Society - 1887 Words

According to a recent study taken by the Gallup Poll, taken by the US government, states that 58 percent a clear majority are in favor of legalization of recreational marijuana; compared to the 39 percent that say no and the additional three percent who are unsure. Although the majority of American’s are in favor of recreational marijuana federal law challenges the optimism of Americans. In 48 states marijuana is classified as a â€Å"controlled substance† putting Americans at risk of a felony charge and permanently altering the life of an individual. By letting the voters choose, we can truly see the democracy America has to offer while creating a flourishing economy simply by opening up options the public wants. But at what cause? Legalization of recreational marijuana is linked to poor grades and various amount of health illnesses. Although it may be true that marijuana is linked to poor health the economics behind legalization is far more beneficial than most realiz e. Legislators need see what America wants and needs, and by majority that is marijuana. As marijuana becomes a more prominent debate topic America is slowly losing out on the chance of an economic upsurge. While accepting the risk of health issues recreational marijuana needs to be legalized to create jobs for economy, end the war on drugs, and create a safer environment for all America’s citizens. In the beginning America was founded off of the principle of opportunity and constituting a large number ofShow MoreRelatedCliques/Groups, Scapegoats, and Exclusion: the High Society of New York in the Age of Innocence1383 Words   |  6 PagesIn the current time, there are all kinds of groups/cliques. There are: the jocks, the nerds, and the goths in high school, and the upper class, the middle class, and the poor in society. Each of these groups has their own set of customs/rules that are followed. None of these rules are written. They are just understood. If an outsider comes to a clique and doesnt follow their rules, the group excludes them. If a member of a clique does something wrong, then the clique uses that person as aRead MoreSociety Wasn’t Built In a Day: Societal Structure in The Age of Innocence.1328 Words   |  5 Pagesof people’s lives in this very structured society. The numerous traditions and formalities in New York’s society alludes to how little breathing room the people have when it comes to keeping traditions. One of these traditions is the tradition that â€Å"every year on the fifteenth of October, Fifth Avenue opened its shutters, unrolled its carpets, and hung up its triple layer of window curtains. By the first of November this household ritual was over and society had begun to look about and take stock ofRead MoreCultural Differences Between Mncs And Hrm Essay1139 Words   |  5 Pagesin a society perceive the power to be distributed unequally. The high score of PD represents countries with the mor e organizational hierarchy and more power held by the people at the top levels of the hierarchy. Countries with a high Score of PD include India, China and South American countries. On the contrary, U.S can be one example of countries with low power distance (Hofstede, 2001). The second dimension is of Uncertainty Avoidance. It is the degree to which the individuals in a society are threatenedRead MoreThe Age of Innocence - Womens Struggle With Victorian Dogma 823 Words   |  4 Pages(1920) is not set after World War I. In fact, her work is set prior to it at the turn of the century. She describes Old New York from late 19th and early 20th century in great detail, â€Å"New York society and customs†¦are described with an accuracy that is almost uncanny: to read these pages is to live again.† She also looks at the upper class, instead of middle and lower class society with its dance halls of debauchery and improper solicitations. The threat of modernity after war and d epression are notRead More Is Canada a Post-Industrial Country? Essay861 Words   |  4 PagesThe term post-industrialism refers to a transition from one form of society to another; the original society being an industrial society, mainly dominated by forms of specialized physical labour, and the latter being a service and knowledge dominated format. An industrial society has many unique and definitive characteristics that separate it from a post-industrial one. Some of these characteristics include the heavy use of machinery in large factories; the use of fossil fuels to power the machinery;Read MoreWhat Are Your Plans For Next Year?1398 Words   |  6 Pagesyoung people are bombarded with on a daily basis. These type of questions are not just quick one worded answers with not much meaning that a high school students can think up quickly. These kind of questions require a lot of thinking and reflecting on the student because it is regarding the rest of their life and how it is going to be spent. In today’s society it is expected for students as young as 16 to know what university they want to go to, what subject to major in, and what kind of job they wantRead MoreImproving Low High School Reform916 Words   |  4 Pageslow-performing high schools become more student-centered, personalized, and intellectually rigorous t hrough the implementation of the Breaking Ranks Model of High School Reform. The model offers a capacity-building approach to school improvement based on the recommendations of Breaking Ranks: Changing an American Institution, which was produced by the National Association of Secondary School Principals (NASSP) in partnership with the Carnegie Foundation for the Advancement of Teaching. Data-Driven High SchoolRead MoreUnited Kingdom - Cultural Leadership Style1703 Words   |  7 Pagescultural dimensions. In each dimension whether it marked high or low can help a business determine how it should operate in that specific country. The first Hofstede dimension is the Power Distance Index. The Power Distance Index has to do with the inequality that not only is accepted but the inequality in existence between individuals of power and also to those without it. There will always be some kind of level of power in all societies and although some may be very unequal this measure simplyRead MoreEaster Island : Historical Analysis1308 Words   |  6 Pagestheories and conclusions about the beginning and end of the society. Easter Island’s environmentally enriched location created a question that historical analysis ponder: why did Easter Island Collapse? In order to have a failed society, there has to be a beginning. It is said that the first people to arrive on the island were the Polynesian, or Rapa Nui, in AD 400. The reason for people to walk this land is because they were in search of new kingdom to settle on or even to escape warfare. The RapaRead MoreThe Cultural Dimension Scores Provided By Geert Hofstede For The United States And Sweden967 Words   |  4 Pagesas the degree less powerful members of a society or workforce accept the inequalities in power (â€Å"Dimensions – Geert Hostede,† n.d.). The United States scores 40 compared to 31 for Sweden. Both countries scored fairly low in power distance suggesting equality is central desire. Lower ranking staff members in societies that exhibit small power ranking scores expect to be consulted (Hostede, 2011). Participative leaders could be very effective in this society as the defining qualities of this leadership

Friday, May 8, 2020

rebeldol Essay on Nora’s Rebellion in Ibsens A Dolls...

Nora’s Rebellion in A Doll’s House The central theme of A Doll’s House is Nora’s rebellion against society and everything that was expected of her. Nora shows this by breaking away from all the standards and expectations her husband and society had set up for her. In her time women weren’t supposed to be independent. They were to support their husbands, take care of the children, cook, clean, and make everything perfect around the house. Nora’s first rebellion was when she took out a loan so that she could pay for her husband, Torvalds medical treatment. It was against the law for women to take out a loan without their husbands consent. When she did this she proved that she wasn’t as submissive and helpless as Torvald†¦show more content†¦Torvald doesn’t trust her with any money and with the little money that he does entrust her with he is afraid that she will spend it on Macaroons, a candy that he has forbid her to eat. He calls her his little squirrel, skylark, and he says she spends money very foolishly. Nora’s second rebellion was when she left Torvald and her children. The society she lived in demanded that she should submit to her husband and that she should take a place under him. Society considered women to be property of their husbands and that they should fulfil their every command. When Krogstad tries to blackmail Nora, and Torvald didn’t even support her she realized that there was a problem. Then finally when Torvald realizes that his social stature will not be harmed he displays his real feeling for Nora, both physically and emotionally. It is at this time when Nora decides that she doesn’t want to be controlled by Torvald anymore and she told him that she was going to leave him. By leaving Torvald she is not only shutting him out but also forgetting everything in her past. When Torvald tries to reconcile with her she explains that all her life she was treated like a child. And how she was always merry, never happy, she never got to make any decisions on her own. Then she explains to him how she

Wednesday, May 6, 2020

Sms Banking Free Essays

Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. We will write a custom essay sample on Sms Banking or any similar topic only for you Order Now And Technology, Nagpur, India manoj_bramhe@yahoo. com Abstract— M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services. Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain text form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost. In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2]. Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, it is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability. Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking. Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objective is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into the GSM standard for support of transmitting information over the signalling channels of the GSM network. USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking. The consumer’s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumer’s mobile banking menu within the SIM card. STK is the most secure method of mobile banking. It allows the bank to load its own encryption keys onto the SIM card with the bank’s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily hacked by any hacker or seen by anyone from message inbox. Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired transaction. Device constraints raise the questions as to wh ether there will be adequate security for users without compromising the ease of use and speed. Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024 Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techniques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message Service Short Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM). Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks. An SMS Gateway allows interfacing software applications to send and/or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile. Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database. Bank sends Customer–side mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuously. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server. Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner. We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original senderâ€℠¢s address by altering respective field in original SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available. V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation. Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fields’s to accommodate for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fields’s as shown in above figure. Account Number: – It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: – It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted session keys stored in file, which will be stored on customer handset. ISSN : 0975-4024 Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: – This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: – Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS. MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS. After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset. Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message. Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer. Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number. If match is not found, it will send message â€Å"Wrong Account Number† to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message â€Å"Wrong Pin Number† to customer handset. Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side â€Å"Fake Transaction† and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset. VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server. Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm don’t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation property of encryption. Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed. This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance. This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system. The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB. Net server side application. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out. Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â€Å"Mobile banking Services in bank area†, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,†Spanish Mobile Banking Services: An Adoption Study†, Proceedings of the International Conference on Mobile Business 2005. Mohammad Shirali-Shahreza,†Improving Mobile Banking Security Using Steganography â€Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,†Mobile Banking Services Based On J2ME/J2EE†, CADSM’2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,†Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literature†, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,†Secure end-to-end mobile payment System†. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,†MMPS: A Versatile Mobile-to-Mobile Payment System†, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,â₠¬ An Efficient Steganography Scheme for M- Commerce†. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, †Text Steganography in SMS†, 2007 International Conference on Convergence Information Technology. Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, †Secure Display and Secure Transactions Using a Handset†, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, â€Å"A Novel Security Mobile Payment System Based On Watermarked Voice Cheque†. M. Shirali-Shahreza, â€Å"Stealth Steganography in SMS†, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006. Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, â€Å"Security of Mobile Banking†. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud,† Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types†, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,† Implementation of LSB Steganography and its Evaluation for various bits†. ISSN : 0975-4024 Dec 2011- Jan 2012 479 How to cite Sms Banking, Essay examples Sms Banking Free Essays Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 SMS BASED SECURE MOBILE BANKING Manoj V, Bramhe Department of Information Technology, RTM Nagpur university St. Vincent Pallotti College of Engg. We will write a custom essay sample on Sms Banking or any similar topic only for you Order Now And Technology, Nagpur, India manoj_bramhe@yahoo. com Abstract— M-banking has emerged as one of the main division of m-commerce. Mobile banking services consists of information inquiry, notifications and alerts, applications and payment transfer. Mobile based application is used for connecting customer handset with bank server for all such services. Current M-banking applications used by banks are facing security challenges for payment transfer banks are using secure payment gateway and other security measures which increases cost and infrastructure for bank but major day-to-day banking applications are inquiries, notifications and alerts. The problem with current banking applications is that they send data directly to customer in plain text form compromising with security. We present SMS based secure mobile banking which enhances security with minimum cost. In this approach bank hides customer transaction data is secure SMS using AES symmetric cryptographic algorithm and send it customer application supported handset. Customer application decrypts data in secure manner. Keywords: M-banking, MD5, AES, MPIN I. INTRODUCTION M-banking system is one which provides all daily banking operations to customer with one click of his mobile handset with supported application. M-banking system has potential to provide access or delivery of very specific and highly necessary information to customer as given in [2]. Growth in the M-Banking is driven by various facilities like convenience of banking operations, greater reach to consumers and Integration of other m-commerce services with mobile banking. In M-banking there is no place restriction, it is highly penetration coefficient as growth of mobile phones are more than computers, it is fully personalized and private increasing transaction authenticity and is 100% available all the time with users. However, there are several challenges that need to be addressed to completely utilize the benefits of the M-Banking like handset compatibility, security, scalability, reliability. Due to increase in use of mobile handsets for many m-commerce applications, Chances of mobile hacking for financial benefits are heavily increased. Currently mostly all banks in India and outside are sending text SMS directly to the customer handset for basic bank services without any security which can be accessed by any malicious person and can use this information for getting access to customer account. OTA (Over-the-air) mobile data can be hacked in network path from bank to customer mobile handset including MPIN, a password use for user identification in M-banking. Thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. Our objective is to provide cost effective, secure, fast M-banking solution combining features of cryptography. In this paper we have presented SMS based secure mobile banking with minimum cost using cryptography. II. M-BANKING CHANNELS M-banking can be executed using various channels like SMS, USSD, GPRS, WAP; Phone based Application, SIM Application. All of these channels are used separately or combined for various banking operations ISSN : 0975-4024 Dec 2011- Jan 2012 472 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 A. Short Message Service (SMS) SMS is the simplest form of mobile banking. It is largely used for information-based services. SMS has the maximum reach amongst consumers since all the mobile phones support SMS. Short messages are stored and forwarded by SMS centres. These messages have some security issues. B. Unstructured Supplementary Services Delivery (USSD) USSD is a technology unique to GSM. It is a capability built into the GSM standard for support of transmitting information over the signalling channels of the GSM network. USSD provides session-based communication. Turnaround response times for interactive applications are shorter for USSD than SMS. In USSD, the interaction is in the form of a continuous session as opposed to SMS. USSD is available on all handsets. C. Wireless Application Protocol (WAP) / General Packet Radio Service (GPRS) GPRS is a packet-switched data service available to GSM users. GPRS enables services such as WAP access, Multimedia Messaging Service (MMS), and Internet communication services such as email and World Wide Web access in mobile phones. . WAP is wireless application protocol used over GPRS. It is similar to Internet banking. The consumer’s handset needs to be WAP enabled. WAP banking is open to similar threats as Internet banking. D. Phone-based Application Phone based applications are developed in various languages like J2ME, . NET having advantages that it can use GPRS, USSD or SMS, MMS to carry the consumer data/instruction in an encrypted format and it is operator independent. These are secure application which resides on supported handset. E. SIM Application Tool Kit The SIM Application Toolkit allows for the service provider or bank to house the consumer’s mobile banking menu within the SIM card. STK is the most secure method of mobile banking. It allows the bank to load its own encryption keys onto the SIM card with the bank’s own developed application. III. CURRENT M-BANKING Even though various channels are available for M-banking most of the banks uses SMS as basic and cheap channel for basic banking operations. Currently all banks in India like ICICI, HSBC, SBI etc are not using any encryption techniques in SMS based M-banking system. They are using simple text based SMS for customer queries in which they directly send account information to customer only hiding some digits of account number which can be easily hacked by any hacker or seen by anyone from message inbox. Even though some banks do provide some other channel like GPRS and WAP but cost of implementation is more and these facilities are not available on all types of mobile handset thus there is a need of secure and cost effective solution which can be easily provided on all types of handsets. A. Issues in M-banking 1) Lack of Standards: The lack of standards gives rise to lot of local and fragmented versions of m-payments offered by different stakeholders. Standards need to address security and privacy concerns of customers as well as interoperability between various implementations. ) Device constraints: There are technical issues related to the mobile devices . The mobile phones suffers from various constrains like less processing power and memory, bandwidth, short battery life , frequent disconnections, tiny screens, poor resolution and privacy issues. 3) Security Issues: Securing m-Commerce is even more difficult than wired transaction. Device constraints raise the questions as to wh ether there will be adequate security for users without compromising the ease of use and speed. Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data hence any malicious user can access customer important data on mobile and used it for malicious purpose thus direct sending of data is not suggestible for M-banking. SMS are prone to spoofing and there are issues related to SMS encryption. However technology manufacturers are developing improved security for applications with authentication and encryption technologies and many claims that the ISSN : 0975-4024 Dec 2011- Jan 2012 473 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 transaction using mobile device is fully secure. There are many techniques for secure M-banking operations but major research work has been done on Cryptography and steganography techniques. Cryptography is a process of converting plaintext data into cipher text using cryptographic algorithms. They insure basic security requirements like authentication, confidentiality, integrity and non-repudiation. B. Basics of Short Message Service Short Message Service (SMS) is the ability to send and receive text messages to and from mobile telephones. SMS was launched as a part of GSM1 standard. Each short message is up to 160 characters in length. The 160 characters can comprise of words, numbers, or punctuation symbols. Short Message Service is a store and forward service; this means that messages are not sent directly to the recipient but via a network SMS Centre. SMS comprises two basic point-to-point services as Mobile-originated short message (MO-SM) and Mobile-terminated short message (MT-SM). Mobile-originated short messages are transported from MOcapable handset to SMSC whereas Mobile-terminated short messages are transported from SMSC to the handsets. The figure no. 1 shows a typical organization of network elements in a GSM network supporting SMS. Fig. 1. Basic model of SMS based M-banking The benefits of SMS to subscribers are convenience, flexibility, and seamless integration of messaging services and data access, delivery of notifications and alerts, guaranteed message deliver, reliable, low-cost communication mechanism, increased subscriber productivity, delivery of messages to ultiple subscribers at a time. The SMSC (Short Message Service Centre) is the entity which does the job of store and forward of messages to and from the mobile station. The SME (Short Message Entity), which is typically a mobile phone or a GSM modem, can be located in the fixed network or a mobile station, receives or sends SMS. The SMSC usually has a configurable time limit for how long it will store the message. SMS Gateway SMS Gateway is an interface between software applications mobile networks. An SMS Gateway allows interfacing software applications to send and/or receive SMS messages over mobile network. A GSM Modem modulates outgoing digital signals from a computer or other digital device to signals for a GSM network and demodulates the incoming GSM signal and converts it to a digital signal for the computer or other digital device. IV. PROPOSED SOLUTION Current real time M-banking application of various banks uses plain text messages without any security algorithm for sending data in SMS banking hence any malicious user can access customer important data on mobile. Proposed secure M-banking is based on symmetric cryptographic techniques where common secret key is shared among bank customer and bank server. Proposed Architecture consists of 4 components as Customer Mobile application, Bank Server application, Bank side mobile / GSM Modem, Bank database and wireless OTA [1]. Our solution uses windows mobile as client application platform and . NET framework as server side software. Customer interested in using M-Banking facilities has to make registration only once with corresponding bank. Bank has all necessary details of customer in database. Bank sends Customer–side mobile application developed for windows mobile to user. Application will be installed once on windows mobile supported handset. This application consists of Login screen along with get session key option, menu screen for bank services options, and encryption and decryption screens for outgoing and incoming secure SMS and send message screen to send SMS to server GSM handset /Modem. Application will be updated as and when bank updates it. ISSN : 0975-4024 Dec 2011- Jan 2012 474 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Bank will have GSM mobile Handset / GSM modem connected to bank application server. GSM handset will be connected to application server using either Bluetooth or USB cable having SIM card installed in it which has task of receiving, processing and replying customer SMS continuously. GSM handset/ modem are cheaper and can be easily installed but have slow speed for message handling which can be increased by connecting modem with SMSC centre over internet. Secure M-Banking server side application is developed in windows compatible environment like VB. NET which can be installed on bank application server. Application is consisting of SMS Service, Information Manage, Account Details Manage, User Request modules to receive and process secure encrypted message from customer mobile. SMS Service module is responsible for retrieving and replying secure SMS automatically whenever they reaches server GSM handset / Modem. Bank database consists of various tables storing customer details pertaining to his personal information, Account information and transaction information. Bank database stores customer confidential information like his MPIN, Mobile identification pin and encryption keys in encrypted and secure manner. We have discussed various major types of M-Banking channels as SMS, GPRS, WAP and USSD out of which every channel has own advantages and disadvantages. WAP and GPRS are good and provide session based security but they are handset dependent and also in rural part of India all mobile operators are not providing respective services. USSD is used along with SMS and requires separate infrastructure. Thus SMS channel is simple, easy to implement, cheaper and widely used channel which is device independent. Current SMS based M-banking service has many drawbacks s SMS is inherently developed in GSM for non-sensitive message transfer among users. Mutual authentication, text encryption, end-to-end security and non-repudiation is not present in design of GSM architecture [16]. Major issues with SMS based banking are SMS Spoofing which is an attack where malicious user sends out SMS message which appears to be sent by original sender. Current SMS architecture allows hiding original senderâ€℠¢s address by altering respective field in original SMS header. Also SMS has encryption only during path from base transreceiver station and mobile station. End-to-end encryption is not available. V. IMPLEMENTATION We have implemented proposed solution in . NET platform for windows mobile in windows environment. Customer mobile application in . NET framework runs on supported windows mobile handset for which we have used HTC mobile and bank server application is running in . NET along with any GSM handset connected in Bluetooth / USB mode to it. We have added secure SMS structure which provides extra security along with satisfying security parameters. This secure SMS will add extra security features like cryptographic and hashing algorithm to satisfy confidentiality, integrity, authentication and non-repudiation. Our system is based on secure SMS protocol and it uses SMS as media to send and receive encrypted information. . A. Secure SMS Message Structure The secured SMS message is divided into multiple fields’s to accommodate for the various security checks required for the protocol. Figure no. 2 shows the structure overview for a secure SMS message. The use of each labelled structure is explained below. Account No. Session Key Cipher Text (6 digit) (Generated From MPIN) (Plain Text + MPIN) Message Digest Fig. 2. Secure SMS message Structure Secure SMS message structure proposed by us consists of 4 fields’s as shown in above figure. Account Number: – It is customer account number in bank which is first field used for authentication purpose. This information is stored in plain test format so that at the server end, information can be retrieved to get required keys from database. Session key: – It is onetime key randomly generated from customer MPIN inputted in bank server database during M-Banking registration process. This key is stored in 2nd field of message. Customer makes a request to get session key from his handset to bank server. Bank server will reply this with encrypted session keys stored in file, which will be stored on customer handset. ISSN : 0975-4024 Dec 2011- Jan 2012 475 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Cipher Text: – This text is created from combination of plain text and MPIN and stored in 3rd filed of message structure. Main idea behind this is to protect data from malicious attacker. As MPIN is most important data and from which session keys are created to be used for encryption and decryption purpose, hence it s send in encrypted manner. Message Digest: – Message digest is used for checking integrity. Customer message digest is calculated from combination of plain text and MPIN and stored in 4th field of secure SMS. MD5 algorithm is used to calculate message digest on both ends. This received digest will be compared with calculated digest at bank server end , if not found of same size then message will be discarded as fake transaction and no message will be send to mobile handset from which request is sent. B. Sending Secure SMS from Client Mobile Whenever customer wish to make any transaction using M-banking, he will run application installed on handset and provide all necessary details. We have used 6 transactions for testing purpose and information collected from user on his handset is used to generate secure SMS. After registration customer will get mobile application installed once on his windows mobile. Customer will enter 4-digit MPIN which will be stored in server database in encrypted format using his password. For non-repudiation purpose we have added concept of one time session key. Server uses customer MPIN to generate session key randomly and again stored them in encrypted format. Customer runs the banking application and feed details of 6-digit account number, 4-digit MPIN and 4digit password and click button to get session key. Server sends generated session key to customer handset which will be stored in encrypted format on his handset. Customer goes to menu screen, chooses requires account type and type of transaction he wish to perform and goes to next screen. Mobile client application shows 4 entries on next screen consisting of session key received, generated fixed plain text message depending upon transaction chosen, cipher text created from combination of plain text and MPIN and 4-part secure message. Secure SMS contains account number in plain text, session key in encrypted format, cipher text created from plain text and MPIN and message digest calculated from message. Customer will send message to sever using as normal message. C. Receiving and Replying Secure SMS from Server Module Proposed Server is running on computer installed with required software like VB. NET, Windows mobile device centre and SDK, . NET compact framework, MS-access and Server side application. Server side application has four modules as SMS Service, Information Manage, Transaction Manage and User Requests. SMS service module retrieves SMS received at Server side handset and decode it to get original query send by customer. Server application process query, get required data from bank database and then sends it in encrypted format to customer mobile through bank side modem. Whenever Customer sends any secure SMS containing his transaction query to server side GSM Modem, Server application automatically retrieves secure SMS and deletes it from server attached handset to avoid flooding of message inbox. We have used ActiveX control for this purpose. Bank Server application splits received secure SMS in same 4-parts. Server reads first part, a plain text 6-digit account number and compares it with database stored account number. If match is not found, it will send message â€Å"Wrong Account Number† to customer handset. If account match is found then server uses 2nd part of secure SMS, which is session key send by user to decrypt 3rd part of received secure SMS. After decrypting 3rd part of SMS, server application gets combination of plaintext as customer original transaction query followed by 4-digit MPIN. Server application compares received MPIN with stored MPIN from server table if a match is not found, will send message â€Å"Wrong Pin Number† to customer handset. Server calculates message digest of 3rd part received using MD5 algorithm and compare it with received massage digest, 4th part of secure SMS to check for message integrity. If match is not found, server generates message on server side â€Å"Fake Transaction† and sends nothing to customer side handset as it may be off any malicious user. If all security checks are proper, Server application process query of customer and get required data from database encrypts data using session key received from customer and sends automatically to customer handset. VI. EXPERIMENTAL RESULTS We have developed two applications for client and server side. Mobile client application is developed using . NET compact framework and VB. NET, installed on windows mobile supported HTC mobile device. This application is used by customer for various M-banking transactions to send encrypted secure SMS to bank ISSN : 0975-4024 Dec 2011- Jan 2012 476 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Server and gets back encrypted reply from bank Server. Client and Server side application performs symmetric encryption and decryption using 256-bit AES symmetric encryption algorithm. MD5 algorithm is used for hashing purpose. Server side bank application is developed using VB. NET it uses SMS toolkit, an ActiveX control to retrieve and process secure SMS automatically. Server side application also contains certain modules for database management of customer account and transactions Normally symmetric cryptographic algorithm don’t have non-repudiation as both party shares common secret key but we have used session key concept for maintaining non-repudiation property of encryption. Since Session key is used only once and created randomly, no two users can have common session key and it is created from MPIN, a master key which customer only knows so he cannot deny that he has done transaction. We have carried out 6 types of transaction including Account Balance, Mini transactions, Cheque Book Request, Cheque Stop request, Pay Bill and Fund Transfer. Following are some sample client application module. The figure no. 3 shows session key, user query in fixed plain text format, cipher text generated from combination of plain text and his MPIN and 4-part secure SMS message generated as per format discussed. This last message is sent to server. Fig. 3. Generating 4-Part Secure Message This secure SMS is retrieved by server side SMS service module. Server application split message and decrypt it to get original transaction query of customer. This query is processed to get response data from database which is firstly encrypted and then send to customer handset. Customer handset get auto reply from server side in cipher text, which is decrypted on mobile by client side application to get server response in plain text. The Figure no. 4 shows response obtained automatically from server for account balance. This reply consists of 3 parts. First part is common session key used by server and client. Second part is cipher text received from server application in secure manner. Third part is plain text message obtained after decrypting secure message received from server. Client mobile application uses 256-bit AES algorithm to decrypt message using common session key. This message will be hidden from customer and he will only get final query results in plain text format but for result purpose we have shown this screen. ISSN : 0975-4024 Dec 2011- Jan 2012 477 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. 3 (6), 2011, 472-479 Fig. 4. Secure Reply from Server To be a secure system, it must satisfy Confidentiality, Authentication, Integrity and Non-Repudiation Secure SMS system maintains confidentiality using AES cryptography and Non-Repudiation using session key. Here 3-factor authentication is used for authentication and security purpose whereas Message integrity is carried out using MD5 algorithm. VII. CONCLUSION AND FUTURE WORK We have implemented a secure SMS based Mobile Banking system. The system allows user to carry out all banking transaction securely from anywhere, anytime. All messages from user windows mobile are sent in encrypted format to bank server. Bank server decrypt message, process query and encrypt result in SMS. Server sends message to customer which will be decrypted on his handset. The evaluation of the system was studied for varying banking transaction and under various security threatening malicious activities were recorded. Performance of the transaction is studied. We have executed few banking transaction from HTC windows mobile and using VB. Net server side application. We have used LG GSM mobile as server attached mobile device. Experiments shows that secure SMS Mobile banking provides cost effective and secure system with satisfying Confidentiality, Authentication, Integrity and Non-Repudiation using symmetric cryptography. Application can be used on any windows mobile supported handset from anywhere as no GPRS and WAP are required. We have implemented system using symmetric key AES algorithm. In future better power consumption algorithm like blowfish can be tried out. Steganogrpahy can also be applied for secure M-banking transactions. We can use concept of STK, SIM application toolkit where bank can stored the application and encryption keys on SIM. REFERENCES [1] [2] [3] [4] [5] Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, â€Å"Mobile banking Services in bank area†, SICE Annual Conference 2007, Japan Martinez Borreguero, F. Javier and Chaparro Pelaez, Julian,†Spanish Mobile Banking Services: An Adoption Study†, Proceedings of the International Conference on Mobile Business 2005. Mohammad Shirali-Shahreza,†Improving Mobile Banking Security Using Steganography â€Å", International Conference On Information Technology. Przemyslaw Krol, Przemyslaw Nowak, Bartosz Sakowicz,†Mobile Banking Services Based On J2ME/J2EE†, CADSM’2007. Yousuf S. AlHinai, Sherah Kurnia and Robert B. Johnston,†Adoption of Mobile, Commerce Services by Individuals: A Meta-Analysis of the Literature†, Sixth International Conference on the Management of Mobile Business . ISSN : 0975-4024 Dec 2011- Jan 2012 478 Manoj V, Bramhe / International Journal of Engineering and Technology Vol. (6), 2011, 472-479 [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] T N T Nguyen, P Shum and E H Chua,†Secure end-to-end mobile payment System†. Ashutosh Saxena, Manik Lal Das and Anurag Gupta,†MMPS: A Versatile Mobile-to-Mobile Payment System†, Proceedings of the International Conference On Mobile Business 2005. Iuon-Chang Lin and Yang-Bin Lin,â₠¬ An Efficient Steganography Scheme for M- Commerce†. Mohammad Shirali-Shahreza and M. Hassan Shirali-Shahreza, †Text Steganography in SMS†, 2007 International Conference on Convergence Information Technology. Sandeep Singh Ghotra, Baldev Kumar Mandhan, Sam Shang Chun Wei, Yi Song, Chris Steketee, †Secure Display and Secure Transactions Using a Handset†, Sixth International Conference on the Management of Mobile Business. Jiehua Wang, Song Yuan, â€Å"A Novel Security Mobile Payment System Based On Watermarked Voice Cheque†. M. Shirali-Shahreza, â€Å"Stealth Steganography in SMS†, Proceedings of the third IEEE and IFIP International Conference on Wireless and Optical Communications Networks 2006. Kewin Chikomo, Ming Ki Chong, Alpan Arnab, Andrew Hutchison, â€Å"Security of Mobile Banking†. Dilla Salama Abdul Minaam. Hatem M. Abdul Kadir, Mohily Mohamed Hadhoud,† Evaluating the effects of Symmetric Cryptographic algorithms on Power Consumption for different data types†, International Journal of Network Security, Volume 11, September 2010. Managing the Risk of Mobile Banking Technologies, Bankable Frontier Associates. Deshpande Neeta, kamalapur Snehal,† Implementation of LSB Steganography and its Evaluation for various bits†. ISSN : 0975-4024 Dec 2011- Jan 2012 479 How to cite Sms Banking, Papers

Monday, April 27, 2020

Marleys partner was Scrooge Essay Example

Marleys partner was Scrooge Paper A Christmas Carol is a straightforward allegory. An allegory is a type of narrative story in which events or characters represent a certain idea or theme, which relies heavily on symbolism. Dickenss story is about a greedy, selfless man called Scrooge who is the opposite of what Christmas means. The first line of the novel Marley was dead, Marley we learn was once Scrooges partner and who comes back as a phantom to warm Scrooge to change his ways otherwise he will become a wondering phantom like Marley once dead. Dickens uses symbolism before the book is even open. The title A Christmas Carol. The novel isnt about a carol but carols show joy, happiness and a time for everyone to come together. The main character Scrooge shows the opposite to the title as he was a greedy, cold man, No warmth could warm, nor wintry weather chill the heaviest rain, snow, hail and sleet could boast of the advantages over him in only one respect. The way Scrooge is described in the novel, is as the weather, as the fog in the courtyard thickens as he leaves work, as if the fog were Scrooge. Musical imagery is used, like the title, as staves and used not chapters, which shows that the theme of the carol is brought through the whole novel. We will write a custom essay sample on Marleys partner was Scrooge specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Marleys partner was Scrooge specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Marleys partner was Scrooge specifically for you FOR ONLY $16.38 $13.9/page Hire Writer This creates a mood of happiness and song. Scrooge is introduced in the first staves as the greed in humanity. Marley is also introduced in the fist stave but only as a phantom. Marley was dead. The first line shows that the living dead could come into the novel. Marley being Scrooges partner is exactly like Scrooge, a mirror image. Scrooge and Marley sounds like brothers, or very close friends. Marley returning one night, Christmas Eve to warm Scrooge how he should change his ways before he ends up like Marley, a wondering, free phantom all chained up with his own greed. Scrooge representing the greed of humanity in the novel and Marley being the conscience of mankind. When the two gentlemen visited the counting house to collect for charity and food for the homeless, Scrooge managed to turn this charitable gesture into a something cold. Scrooge begins to talk about places for the homeless to go, but not foster homes or an orphanage Scrooge says are there no prisons, union workhouses and treadmills which they can go to. These words show that Scrooge only cares for one person, himself and finishes with its not my business good afternoon gentlemen forcing the men out with out giving any contribution. Fred is the exact opposite of his uncle Scrooge. Fred symbolises the joy and happiness of Christmas. Fred is undaunted by Scrooges refusal to dine with him on Christmas. Fred says that Christmas is the only time I know when men and women seen by one consent to open their shut up hearts freely, Fred shows the true joy of Christmas. Bob Crachet is a worker for Scrooge and is dependant on him, even though Scrooge doesnt really care for him in the slightest. Scrooge had a very small fire, but the clerks (Bob) fire was so very much smaller that it looked like one coal this proves that Scrooge never cared for anyone not even his own employees. The counting house along with Scrooges cold, bitter greed strengthens Scrooges appearance as a hollow man even though not much is said about his work place Counting brings money into sight which is the only thing Scrooge really cares for. When Marleys ghost appears and talks to Scrooge, he sees the large chain around his body. Scrooge notices that it is made out of catch boxes, keys, padlocks, ledges, deeds and heavy purses wrought in steel. This is to symbolise everything that Marley forgot in life. He made it link by link and yard by yard and of my own free will I wore it. Marley goes on to say how Scrooge also beers a large heavy chain himself but really it symbolises his conscience as that is what Marley is the conscience of mankind. When Marley leaves, Scrooge goes to the window only to see the sky full of phantoms like Marley all wearing chains similar to his and all had a partner. Marleys partner was Scrooge but he was still alive so Marley was alone for now as if Scrooge didnt change his ways then he would be joining Marley and the other phantoms, as they all symbolise what would happen to man if they carry on there bad ways. The partners were all linked together. Scrooge knew most of them from their lives, as they must have been in the same trade as Scrooge. Stave two doesnt introduce many more characters. The first ghost that Marley warned him of came at one oclock at night, the Ghost of Christmas Past.