submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Journal of ICT Standardization

Editor-in-Chief: Anand R. Prasad, NEC, Japan

Associate Editor: Sivabalan Arumugam, NEC India


ISSN: 2245-800X (Print Version),

ISSN: 2246-0853 (Online Version)
Vol: 4   Issue: 3

Published In:   March 2017

Publication Frequency: Triannual


Search Available Volume and Issue for Journal of ICT Standardization


Journal Description        Editorial Foreword        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

ITU X.1303 International Warning Standard: Lessons from an Asian Implementation

doi: 10.13052/jicts2245-800X.431
Nuwan Waidyanatha, Biplov Bhandari and Lutz Frommberger

Sahana Software Foundation, 350 S Figueroa St. STE 437, Los Angeles, CA 90071, USA

Abstract: [+]    |    Download File [ 1324KB ]   |    Read Article Online

Abstract: The International Telecommunication Union (ITU) Standardization Sector recommends implementing the ITU-T X.1303 Common Alerting Protocol (CAP) early warning standard [1]. The Sahana Alerting and Messaging Broker (SAMBRO) software adopts CAP and similar policies and procedures recommended for Mexico by Christian [2]. SAMBRO was operationalized in Myanmar, Maldives, and the Philippines. The strategies for implementing CAP, customizing SAMBRO, and incorporating Information Communication Technologies (ICTs) to meet the individual country requirements, are the primary discussion in this paper. This informative paper presents itself as a case study for CAP Practitioners and Researchers to make use in improving warning interoperability.

Keywords: Warning, Interoperability, Standard, Information Communication Technology.

Strategy for Deep Sea Communication for Safe Fisheries – mKRISHI® Fisheries, a Case Study

doi: 10.13052/jicts2245-800X.432
Dineshkumar Singh1, Sanjay Kimbahune1 and Veerendra Veer Singh2

1Innovation Lab – Mumbai, Tata Consultancy Services Ltd.,Yantra Park, Thane, India
2Mumbai Research Center of CMFRI, Old CIFE Campus, Andheri, Mumbai, India

Abstract: [+]    |    Download File [ 1894KB ]   |    Read Article Online

Abstract: Fishing is one of the most dangerous professions in the world. India with one million active fishermen population still lacks a reliable boat-to-shore communication network. Fishermen with smaller boat are more vulnerable to the wilder nature of the ocean, due to dynamic sea current, wind speed, direction and wave heights, etc. They form 80% of the entire fishing community. There being no physical boundary, the risk of fishermen accidently getting in other country’s terrestrial water, is very high. Hence, the fishermen and their families are always concerned about the safety of the human lives, boat and gears. Due to deep sea communication network we can continuously get oceanic condition information. Such real-time information about wind speed, direction and wave height can help to estimate the risks and avoid the ocean region which seems dangerous. As part of this initiative, we looked at various available communication technologies likeVHF transceivers, satellite communication and cellular mobile communication. Central Marine Fisheries Research Institute, Tata Consultancy Service and Tata Tele Services formed a consortium and piloted a project to extend the mobile signal deep into the sea up to 30 kms. This extended network enabled continuous accessibility of life saving ocean state forecast information provided by INCOIS. Due to this an accessible EarlyWarning System (EWS) spread over a digital highway of 30 by 120 km, along Raigad coast. This paper captures the experiences and recommendations derived from this pilot.

Keywords: Fisheries, mobile, deep-sea, communication, EWS, security.

Wi-Trust: Computational Trust and Reputation Management for Stronger Hotspot 2.0 Security

doi: 10.13052/jicts2245-800X.433
J.-M. Seigneur

University of Geneva, Medi@LAB, G3S, CUI, Réputaction SAS, Geneva

Abstract: [+]    |    Download File [ 1312KB ]   |    Read Article Online

Abstract: In its list of top ten smartphone risks, the European UnionAgency for Network and Information Security ranks network spoofing attacks as number 6. In this paper, we present how we have validated different computational trust and reputation management techniques by means of implemented prototypes in real devices to mitigate malicious legacy Wi-Fi hotspots including spoofing attacks. Then we explain how some of these techniques could be more easily deployed on a large scale thanks to simply using the available extensions of Hotspot 2.0, which could potentially lead to a new standard to improve Wi-Fi networks trustworthiness.

Keywords: Wi-Fi, public hotspot, computational trust, reputation management.

Curbing Mobile Phone Terrorism and Financial Fraud: A Kenyan Perspective

doi: 10.13052/jicts2245-800X.434
Philip Muriuki Wanjohi

Kirinyaga University, Kenya

Abstract: [+]    |    Download File [ 407KB ]   |    Read Article Online

Abstract: Kenya being a leading mobile phone operator in Africa provides a suitable platform of understanding security weaknesses in relation to terrorism and financial frauds perpetrated through mobile phone technology. According to [5]; origin and use of mobile money transfer make the country a suitable case that can be replicated elsewhere in the world. It is worth noting that growth of mobile money transfer has promoted business alongside creating new employment opportunities in Kenya. However the growth of mobile phone technology has had an equal share of problems; subsequently leading to challenges of financial frauds, and terrorism activities. This paper addresses a mechanism of safe mobile phone technology through enhanced biometrics during financial transactions, SIM registration, and forensic audit trail in case of a crime.

Keywords: Alshabaab, Agent, Biometric, M-pesa, Safaricom, Sim

River Publishers: Journal of ICT Standardization