Sei sulla pagina 1di 5

Multipurpose Smart SIM Card Based on Mobile

Database and Location Dependent Query


Hamid-Reza Firoozy-Najafabadi

Mohammad-Reza Feizi-Derakhshi

Department of Computer Engineering


Science and Research Branch, Islamic Azad University
Tabriz, Iran
hr.firoozy@iauotash.ac.ir

Department of Computer Science


University of Tabriz
Tabriz, Iran
mfeizi@tabrizu.ac.ir

According to increasing development of


technology and in order to approaching electronic
government, most citizen services are presented
electronically using smart electronic cards. Regarding this
fact, people have several smart cards which are increasing
in number everyday. Despite of so many advantages, these
cards have various disadvantages such as multiplicity,
troublesome carrying, unavailability of card readers in
many places, waiting in the queues of ATMs, etc. In this
paper we will present a new approach named
multipurpose smart SIM card in order to solve these
problems. Proposed SIM card, acts based on mobile
database architecture that we will discuss about this
architecture and location dependent queries processing in
it. Then we will study the problem of finding the nearest
and most unoccupied ATM as a case study and at last we
will propose a method to authenticate users in this system.

Abstract

Keywords- smart SIM card; mobile computing; mobile


database; location dependent query; authentication

I.

INTRODUCTION

Todays world is a technological world and its dominant


atmosphere induces human toward mechanization and
facilitation. In this case and across growing procedure of
technology, concept of electronic card has been established.
Such cards help us doing our tasks timely and reliably.
Nowadays smart cards are used as bank card, telephone
card, subway credit card, fuel card, buying card, health card,
etc. [10]. And the number of these cards is increased everyday
and some other new electronic cards like health electronic card,
passport electronic card, driving license card and so many other
electronic cards will be required. So one day in a future we
should carry so many electronic cards every time we want to
go out. Another problem is the limitation and low availability
of card readers. It means that when you are at home, in your
car, out of city or other places where there are not any card
readers or ATMs, in this case you are not able to use your
cards.
The solution of these problems is an integration of smart
cards that some countries have attempted to produce a national

smart card [9, 10] in order to integrate a variety of smart card


information on one card to fix the problems. The national smart
card is a plastic card about the size of a credit card, with an
embedded micro-chip to deliver one or more intelligent
capabilities. The national smartcard framework is one of a
number of frameworks and strategies developed to support
interoperable whole-of-government business applications [10].
In this paper we propose a method to this integration and
that is multipurpose smart SIM card. A subscriber identity
module or SIM is a smart card that is designed to fit into
mobile phone. It provides the identification of a user to a
network, allowing him or her to access such services as
telephony, email, internet and text messaging. The SIM card
contains a microcomputer as well as a certain amount of
memory named Random Access Memory (RAM) to process
commands and Electronically Erasable Programmable Read
Only Memory (EEPROM) to store user files. The SIM card
also contains an amount of Read Only Memory (ROM) which
stores the cards operating system. When the SIM card is
activated the microcomputer loads the operating system from
ROM into the RAM of the card and processes commands as
requested by the mobile equipment (ME) or card access device
(CAD). Naturally architecture and foundation network of this
plan should follow a particular standard that we will discuss
about this issue further.
After this introduction, paper is organized as follows:
section 2 provides an overview of mobile database architecture
and in section 3 queries processing in the mobile database is
discussed. Section 4 presents the proposed method to integrate
smart cards and section 5 presents a case study to illustrate a
practical application of the proposed method. Finally
conclusion and future work is presented.
II.

THE ARCHITECTURE OF MOBILE DATABASE

Proposed SIM card database should be implemented based


on mobile database architecture. A mobile database is a kind of
distributed database that supports mobile computing [4]. It
means that its database is distributed on some fixed and mobile
parts so that across movement of users and location changing
of their mobile phones, wireless network has capability of
processing of transactions and data management.

978-1-4673-1740-5 /12/$31.00 2012 IEEE

Figure 1. Mobile database architecture

Figure 1 shows mobile database architecture which


includes:

Fixed Network (FN): Is a conventional wired network


which interconnects some other stationary parts [1, 3].

Fixed Host (FH): This part has a fixed place in


network and it does not have wireless interface.
Therefore mobile units cant connect to it directly [1,
5].

Cell: Network covered area is divided into some cells


that the size of these cells depends on the power of
base station [1, 5]. Mobile units move alternatively
among different cells and have communication with
different support stations at different times.

III.

Mobile Unit (MU) or Mobile Host (MH): These are


devices that are moving and they have the capability
of connecting to fixed network through wireless
connection. Users send their transaction requests
through MU and receive results.
Mobile Support Station (MSS) or Base Station (BS):
The connection of each cell with other cells and fixed
hosts is established through a wireless interface that
called mobile support station or base station. In
addition this device can communicate with one MU
through its wireless interface. Each BS has the address
of whole cells, and when one MU of one cell enters
into another cell, BS in first cell should modify the
address of this MU so that the processing results of
corresponding transactions of this MU send to its new
address [1, 3].
Database Server (DBS): This part is necessary to
incorporate full database functionality [5]. Each DBS
can be reached by any BS or FH directly. But MUs
communicates with a DBS only through BSs [6].
QUERY PROCESSING IN MOBILE DATABASE SYSTEMS

A. Types of Queries
Definitely, transaction processing is based on mobile
database architecture in our proposed method. Generally there

are two types of queries in mobile environments. Non-Location


Related Queries (NLRQ) and Location Dependant Queries
(LDQ). In fact, a NLRQ is a traditional query whose answer
does not depend on locations and none of the predicates and
attributes used in it are location related [2]. (e. g. Retrieve the
names of hotel employees). Contrary to NLRQs, LRQs have at
least one location related predicate or attribute [6].
B. Location Dependant Query
There are two types of location dependant query:

Location Aware queries (LAQ): which has an explicit


indication of location (e.g. Select the names of hotels
in Isfahan).

Location Dependant Queries (LDQ): The location


value in these queries is not explicitly known when the
query is asked. Their answers are dependent to MU's
location; i.e. the mobility affects their processing (e.g.
Retrieve the nearest ATM). In order to provide the
answer to the query, first we have to know the location
of the query issuer. When we find out the issuer's
location (Location Binding), the query becomes
location-aware [2].

C. The Architecture of The LDQ Processing


In the Mobile Network Services, the wireless network
provides the wireless interface and the operator has the
responsibility of supplying the location of the MU to
authorized parties with the help of the Location Service (LS).
We put the LS box in traditional mobile computing architecture
and assume the location of the client is either provided by the
network or by the device (GPS). MUs can communicate with
LDISM, send query and view the results with the help of the
interface [7].
Figure 2 shows architecture of the Location Dependant
Queries processing.

should be stored grater volume of data to integrate


smart cards information.

Electrically Erasable Programming Read Only


Memory (EEPROM): Is non volatile memory that
normally used for storing data and SIM card
applications.

Random Access Memory (RAM): Is writable and


volatile memory and hence is only used for temporary
storage.

SIM Card Operating System: For controlling


execution of application software, loading of new
application program files, reading and writing of data
to memory, and general low-level functions, such as
power on and power off. In other words, the SIM card
operating system is used for accessing the CPU,
EEPROM, RAM and ROM.

File System: This part may be part of the SIM card


operating system that manages how data is stored and
how programs on the SIM card can read and write to
the EEPROM. To integrate information of smart cards
into the multipurpose smart SIM card, this file system
should be designed and implemented appropriate to
provides information exchange.

Application Software: This application runs on the


SIM card CPU SIM card applications run in much the
same way as regular personal computer.

Dedicated Hardware: To deliver certain functions


more securely and efficiently (e. g. cryptography, coprocessors etc.).

Figure 2. The architecture of the LDQ processing

IV.

PROPOSED METHOD

A. Multipurpose Smart SIM Card


By designing a new chip that by helping of mobile database
integrates the information of all the smart electronic cards and
also authentication information of each person in itself we can
solve many of the problems of smart electronic cards and their
resultant troubles. This chip called multipurpose smart SIM
card.
Multipurpose smart SIM card has been embedded in
mobile phone and it is available all the time. We can use this
SIM card by mobile database architecture as a national
certification card, driving license, passport, peoples medical
history, fuel card, subway card, electronic election and some
other applications.
B. Implementation and Integration
The practical implementation of this plan is required to
provide appropriate telecommunications infrastructure and
policies to integrate smart cards into the multipurpose smart
SIM card. That should be established and provided by the
authorities in charge. However, the proposed smart SIM card
should be have major elements to integrate smart cards
information. These elements are shown in figure 3 that are:

Figure 3.

Multipurpose smart SIM card architecture

Central Processing Unit (CPU): Is core of the smart


SIM card that performs information processing.

Read Only Memory (ROM): For carrying operating


system and built-in programs loaded at the time the
SIM card chip is manufactured. The memory of such
a SIM card should be have a greater capacity in
comparison with conventional SIM card, because

C. File System Organization


As mentioned above, to integrate information of smart
cards into the multipurpose smart SIM card, this SIM card
should be have an appropriate and efficient file system. As
shown in Figure 4, the file system of a multipurpose smart SIM
card is organized in a hierarchical tree structure, composed of
the following three types of elements:

Master File (MF): The root of the file system that


contains dedicated and elementary files.

Dedicated File (DF): A subordinate directory to the


master file that contains dedicated and elementary
files.

Elementary File (EF): Is a file that contains various


types of formatted data, structures as either a sequence
of data bytes, a sequence of fixed size records, or a
fixed set of fixed size records used cyclically.

The Global System for Mobile Communication (GSM)


standards defines several important dedicated files immediately
under the MF: DFGSM, DFDCS1800, and DFTELECOM. For the MF
and these DFs, several EFs are defined, including many that are
mandatory. The EFs under DFGSM and DFDCS1800 contain
mainly network related information respectively for GSM 900
MHz and DCS (Digital Cellular System) 1800 MHz band
operation. EFs for U.S. 850 MHz and 1900 MHz bands are

found respectively under those DFs as well. The EFs under


DFTELECOM contain service related information [11].

Figure 5. Authentication of users with image processing

Second method has high security and can solve the


problems of the first method. But it needs an image processing
system and the mobile phone of user should be equipped with
second camera so that it can capture the image of users face.

Figure 4.

Multipurpose smart SIM card file system

After implementing this plan, peoples communications and


transmission of required information with banks, governmental
centers, shops, gas stations, subways, and airports can be done
using this smart SIM card. So, people will be able to perform
several tasks like bank transactions, electronic shopping,
paying the cost of vehicle fuel, cost of insurance, paying tolls
of highways, paying the cost of public transportation systems
in addition to use communicative facilities of their own mobile
phones using this SIM card. Also if the data like certification
information, driving license, passport and medical records have
been saved in a database then all the governmental centers such
as police offices, airports and hospitals can do their inquiries
through this SIM card and using mobile database.
D. Authentication of Users
The first step to provide security is to recognize and
authenticate the users identity that wants to use database
information. In this part we introduce two methods to
authenticate in this system that the second method is our
proposed method.

Current method for user authentication in mobile


phones is based on the use of 4-8 digit Personal
Identification Numbers (PINs) [12]. In other words,
authentication can be performed by a password which
each user enters through his/her mobile phone. The
implementation of this method is simple but if the
mobile phone is theft or illegal people find its
password it may have many hazards. Also this method
may be threatened by destructive and pervasive
software and it can be passed in fact we can prevent
relatively by using a mechanism like figurative
security codes that nowadays it is considered for most
websites (e.g. yahoo) in order to user entrance.
In second method in order to authenticate of users, we
capture a photo from users face and send it to fixed
host, then we perform authentication according to
received picture and the pattern which has been
recorded in database from that user.

In addition to these methods, using new technologies and


techniques such as PKI (Public Key Infrastructure) SIM or
Biometric Techniques, It is possible to provide higher levels of
trust and security for authentication. PKI SIM is an enhanced
SIM card, which incorporates a digital certificate. This
certificate is used to authenticate the user, so no
username/password credentials are needed. Furthermore, it can
be utilized as a digital signature and document signing in MPolice service. Biometric authentication techniques including
fingerprint recognition, retinal scanning, hand geometry
scanning, handwriting and voice recognition can be used too.
These techniques are all based on the physical properties of a
person [12].
E. Advantages and Disadvantages of Proposed Method
The advantages of this smart SIM card include: The ability
of finding the nearest and the least occupied ATM or card
reader device, high availability, easily transportation and
facility in using, low waiting in the queues of ATMs or card
reader devices, not need to carry so many smart cards, the
ability of using as peoples medical records, insurance booklet,
driving license, passport, national card, fuel card, subway card
and etc.
We can mention some possible disadvantages of this
method: Low network bandwidth, power limitation (low power
of batteries), and frequent disconnection, less reliability, higher
probability of failure (loss, damage), latency and asymmetry in
the communications (client-server vs. server-client) losing or
thievery of SIM card, burning of SIM card, requiring an
individual SIM card for each person and lack of necessary
telecommunications infrastructure. [1, 4, 12].
V.

CASE STUDY

In order to illustrate a practical application of the


multipurpose smart SIM card, we designed a problem named
finding the nearest and least occupied ATM. This case study
will be described in three steps.
First step: Assume that a user is moving in the street and
wants to reach to the nearest and least occupied ATM. He/she
can perform a query by using his/her mobile unit and receives
the address and distant of the nearest ATM according to his/her
current location and considered distance radius from network.
By using this query, even user can be aware of the number of
waiting people in queue in order to use that ATM.

atm address , distance , count

( closest ( here,radius )) ( ATM )

User can receive the information of the nearest ATM


according to his/her current location at given distance radius
using a query as follow, (e.g. 3 items) and then select the most
appropriate item according to the location of devices, their
distances and the number of waiting people in queue.

atm address , distance , count

(TOP3closest ( here,radius )) ( ATM )

The result of above query in sent to user as follows:


TABLE I.

RESULT OF QUERY

ATMs

Address

Distance

Count

ATM 1

Street No. 12

5km

ATM 2

Street No. 16

12km

ATM 3

Street No. 5

1km

This query is a location dependent query that its response


depends on the users location and his/her movement after
sending query; it means that the responses are changing by
users movement continuously. Fixed host first should ask the
current location of querys source from BS in order to respond
to this query, so that it can send the result to the location of that
mobile unit. If during performing the transactions of that query,
user moves from one cell to another cell, the BS in first cell
should modify the address of this mobile unit so that the result
of query can be send to its new address.
Second step: After receiving the obtained results of query
by user, he/she can send a turn request in order to use given
ATM according to his/her current location in proportion to the
nearest ATM and the number of waiting people. Host (ATM)
allocate the requested turn to user and sends it to user through
wireless network so that he/she would have its own turn and
then approach to given ATM and use it. Also host should save
the password of a person who has requested turn accompanied
with turn number in its database that it can perform
authentication while using ATM by that user and makes sure
that the turn number of a person who is using ATM really
belongs to his/her and he/she has not used another persons
turn. Authentication performs by accommodating a password
which user enters when he/she uses ATM and a password
which the host has saved while requesting turn in its database.
Third step: When user reaches his/her given ATM, he/she
should wait until his/her turn number is read by ATM, so
he/she can use ATM. ATM calls turn numbers sequentially and
wait for each turn one interval period (e.g. 15 seconds). If
given person does not refer to ATM in that period, it will call
the next turn number. If the user reaches given ATM late and
his/her turn has been passed, he/she should send a new request
turn for that ATM device again. In fact in introduced approach,
just for getting money, there is a need for ATMs and doing
above steps. Other bank operations like money transmission,
bill payment, shopping services and etc. can be performed
without requirement of ATM and through mobile unit and
wireless connection with network.

CONCLUSION AND FURTHER WORKS


One of the requirements of electronic governments is to
provide and distribute smart cards for different applications
which cause each person should carry several and this issue can
makes problems that we have mentioned in this paper. Our
proposed method integrates the information of all the smart
electronic cards into a multipurpose smart SIM card. This SIM
card works based on mobile database architecture. Some of the
advantages of this method include not need to carry various
smart electronic cards, not waiting in the queues of several card
readers, ease of use, high availability and easily carrying. This
SIM card also can be used as a driving license, passport,
medical history, electronic election, fuel card, subway card and
some other cases.
One of the main challenges of this plan is to provide
appropriate telecommunications infrastructure in order to
practical implementation and developed the multipurpose smart
SIM card system. Of course, the authors in future work will
create a lab environment to simulate and test multipurpose
smart SIM card system. Other critical issues of this system is
warranty the reliability of wireless connections, security
mechanisms in order to prevent the penetration of hackers and
illegal users that we can study these challenges in the future.
Also the detailed studying of other aspects of using this method
(e.g. using as medical applications, electronic election, driving
license, fuel card, etc.) can be a subject to future researches.
REFERENCES
[1]

D. Barbara, Mobile computing and databases - a survey, IEEE


Transaction on Knowledge and Data Engineering, vol. 11, no. I, pp. 108117, 1999.
[2] A. Y. Seydim, M. H. Dunham, and V. Kumar, Location dependent
query processing, 2nd ACM International Workshop on Data
Engineering for Wireless and Mobile Access, pp. 47-53, 2001.
[3] M. H. Dunham and A. Helal, Mobile Computing and Databases:
Anything New?, SIGMOD Record, vol. 24, no. 4, pp. 5-9, 1995.
[4] J. Li, Y. Li, M. T. Thai, and J. Li, Data Caching and Query Processing
in MANETs, Pervasive Computing and Communications, vol. 1, no. 3,
pp. 169-178, 2005.
[5] V. Kumar, Mobile Database Systems, NJ: John Wiley & Sons INC.,
2006.
[6] M. Tarafdar and M. S. Haghjoo, Location Privacy in Processing
Location Dependent Queries in Mobile Database Systems, 5th IEEE
International Symposium on Telecommunications, pp. 181-186, 2010.
[7] W. Xinhua and L. Li, Location Dependent Continuous Queries
Processing Model Based on Mobile Agent, 9th IEEE International
Symposium on Distributed Computing and Applications to Business,
Engineering and Science, pp. 224-227, 2010.
[8] S. lIarri, E. Mena, and A. Illarramendi, Location-Dependent Query
Processing: Where we are and where we are heading, ACM Computing
Surveys, vol. 42, no. 3, pp. 1-73, 2010.
[9] UNCTAD, Information Economy Report, United Nations, New York
and Geneva, 2005.
[10] Department of Finance and Deregulation, National Smart Card
Framework, Australian Government Information Management Office,
2008.
[11] 3GPP, 2005a, Specification of the Subscriber Identity Module - Mobile
Equipment (SIM - ME) interface, 3rd Generation Partnership Project,
TS 11.11 V8.13.0 (Release 1999), Technical Specification, 2005.
[12] H. R. Firoozy-Najafabadi and S. Pashazadeh, Mobile Police in Mobile
Government, 5th IEEE International Conference on Application of
Information and Communication Technologies, pp. 118-122, 2011.

Potrebbero piacerti anche