A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todemand of mobile users if we want to ensures more security at the time of data transfer in mobilecommunication we need location dependency .It means ,when we encrypt a particular data packet at sendingend and after transmitting that data to the receiver ,the receiver can be able to decrypt that packet only from aparticular location (not from anywhere) specified by the sender by transferring location based coordinate target.In our proposed location based data encryption-decryption approach a target latitude/longitude coordinate isincorporated with a random key for data encryption. The receiver can only decrypt the cipher text when thecoordinate acquired from GPS receiver is matched with target coordinate .The location of a receiver is difficultto exactly match with target coordinate .So we proposed a parameter distance tolerant(DT) in our proposedapproach to increase its practicality. The security analysis shows that to probability to break our proposedalgorithm is almost impossible since the length of the random key is adjustable.
Authors and Affiliations
Sourish Mitra , Avijit Chakraborty , Arunabha Bhaumik , Joy Dewanjee , Mainak Maulik
Numerical and Experimental Study the Effect of Impeller Design on the Performance of Submerged Turbine
Abstract: "This work presents the design and fabrication of Gorlov helical water turbine. The turbine was tested theoretically and experimentally. For the experimental part open channel was long=1600cm, high=45cmand widt...
Customized Ontology model for Web Information Gathering using Clustering
Abstract: The explosion of data leads to the problem on how information should be retrieved accurately and effectively. To address this issue, ontology’s are widely used to represent user profiles in personalized w...
Cloud Security Tracking, Log Maintenance and Notification System for Multitenant Mission Critical Cloud Applications
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. It advantages to mention but a few include sca...
Impact of Random Waypoint Mobility on Reactive Routing Protocols of Scalable Mobile Ad hoc Network
Abstract : Mobile Ad hoc networks are the self-configuring network, in which there is no centralized access point. The mobile nodes itself act as routers for one another. MANET is basically a wireless ad hoc network with...
Cryptanalysis and Improvement of Kang et al. Certificateless Aggregate Signature Scheme
The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such...