A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todemand of mobile users if we want to ensures more security at the time of data transfer in mobilecommunication we need location dependency .It means ,when we encrypt a particular data packet at sendingend and after transmitting that data to the receiver ,the receiver can be able to decrypt that packet only from aparticular location (not from anywhere) specified by the sender by transferring location based coordinate target.In our proposed location based data encryption-decryption approach a target latitude/longitude coordinate isincorporated with a random key for data encryption. The receiver can only decrypt the cipher text when thecoordinate acquired from GPS receiver is matched with target coordinate .The location of a receiver is difficultto exactly match with target coordinate .So we proposed a parameter distance tolerant(DT) in our proposedapproach to increase its practicality. The security analysis shows that to probability to break our proposedalgorithm is almost impossible since the length of the random key is adjustable.
Authors and Affiliations
Sourish Mitra , Avijit Chakraborty , Arunabha Bhaumik , Joy Dewanjee , Mainak Maulik
Implementation of an Improved Multi-Channel Security in Cloud Computing Using Image Steganography and RSA Algorithm
The increase use of cloud computing infrastructure has led to a security consciousness by users and cloud service providers to protect data available in the cloud from illegal users. Even though, different techniques hav...
“Design and Detection of Mobile Botnet Attacks”
Abstract: A mobile botnet is a type of bot that runs automatically when installed on a mobile phone, which does not have any anti-malware. The botnet gains complete access over our mobile device. The common propagation m...
Performance Comparison of SVM and ANN in Predicting Compressive Strength of Concrete
Abstract : Concrete compressive strength prediction is very important in structure and building design, particularly in specifying the quality and measuring performance of concrete as well as determination of its mix p...
Evaluate the Effectiveness of Test Suite Prioritization Techniques Using APFD Metric
Abstract: Regression testing is a testing activity that is performed to provide confidence that changes do not harm the existing behavior of the software. Test suites tend to grow in size as software evolves...
Survey of Machine Learning Techniques in Textual Document Classification
Classification of Text Document points towards associating one or more predefined categories based on the likelihood expressed by the training set of labeled documents. Many machine learning algorithms plays &nbs...