A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todemand of mobile users if we want to ensures more security at the time of data transfer in mobilecommunication we need location dependency .It means ,when we encrypt a particular data packet at sendingend and after transmitting that data to the receiver ,the receiver can be able to decrypt that packet only from aparticular location (not from anywhere) specified by the sender by transferring location based coordinate target.In our proposed location based data encryption-decryption approach a target latitude/longitude coordinate isincorporated with a random key for data encryption. The receiver can only decrypt the cipher text when thecoordinate acquired from GPS receiver is matched with target coordinate .The location of a receiver is difficultto exactly match with target coordinate .So we proposed a parameter distance tolerant(DT) in our proposedapproach to increase its practicality. The security analysis shows that to probability to break our proposedalgorithm is almost impossible since the length of the random key is adjustable.

Authors and Affiliations

Sourish Mitra , Avijit Chakraborty , Arunabha Bhaumik , Joy Dewanjee , Mainak Maulik

Keywords

Related Articles

 A Comparative Study of Contrast Enhancement using Image Fusion

 Abstract: Image enhancement is used to improve the visual quality of an image. In this paper a different approach on image fusion has been described for image enhancement. The two main algorithms involved in this...

 Survey on Security Issues and Secure Protocols for Manet

 A mobile ad-hoc network (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links the union of which form an arbitrary topology. The routers are free to move rando...

 Survey on Job Schedulers in Hadoop Cluster

 Hadoop-MapReduce is a powerful parallel processing technique large for big data analysis on distributed commodity hardware clusters such as Clouds. For job scheduling Hadoop provides default FIFO scheduler wher...

 Video To Animated Cartoon Conversion

 Abstract: the logic of animation making from real video fully depends on various image processing techniques and various kinds of filtering like Gaussian filtering, bilateral filtering, and flow based bilateral fil...

 Intrusion Detection Systems By Anamoly-Based Using Neural  Network

 To improve network security different steps has been taken as size and importance of the network has  increases day by day. Then chances of a network attacks increases Network is mainly attacked by some &nbsp...

Download PDF file
  • EP ID EP116595
  • DOI -
  • Views 64
  • Downloads 0

How To Cite

Sourish Mitra, Avijit Chakraborty, Arunabha Bhaumik, Joy Dewanjee, Mainak Maulik (2015).  A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 56-63. https://europub.co.uk/articles/-A-116595