A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todemand of mobile users if we want to ensures more security at the time of data transfer in mobilecommunication we need location dependency .It means ,when we encrypt a particular data packet at sendingend and after transmitting that data to the receiver ,the receiver can be able to decrypt that packet only from aparticular location (not from anywhere) specified by the sender by transferring location based coordinate target.In our proposed location based data encryption-decryption approach a target latitude/longitude coordinate isincorporated with a random key for data encryption. The receiver can only decrypt the cipher text when thecoordinate acquired from GPS receiver is matched with target coordinate .The location of a receiver is difficultto exactly match with target coordinate .So we proposed a parameter distance tolerant(DT) in our proposedapproach to increase its practicality. The security analysis shows that to probability to break our proposedalgorithm is almost impossible since the length of the random key is adjustable.

Authors and Affiliations

Sourish Mitra , Avijit Chakraborty , Arunabha Bhaumik , Joy Dewanjee , Mainak Maulik

Keywords

Related Articles

Implementation of an Improved Multi-Channel Security in Cloud Computing Using Image Steganography and RSA Algorithm

The increase use of cloud computing infrastructure has led to a security consciousness by users and cloud service providers to protect data available in the cloud from illegal users. Even though, different techniques hav...

“Design and Detection of Mobile Botnet Attacks”

Abstract: A mobile botnet is a type of bot that runs automatically when installed on a mobile phone, which does not have any anti-malware. The botnet gains complete access over our mobile device. The common propagation m...

 Performance Comparison of SVM and ANN in Predicting Compressive Strength of Concrete

Abstract : Concrete compressive strength prediction is very important in structure and building design, particularly in specifying the quality and measuring performance of concrete as well as determination of its mix p...

 Evaluate the Effectiveness of Test Suite Prioritization Techniques Using APFD Metric

 Abstract: Regression testing is a testing activity that is performed to provide confidence that changes do not  harm the existing behavior of the software. Test suites tend to grow in size as software evolves...

 Survey of Machine Learning Techniques in Textual Document  Classification

 Classification of Text Document points towards associating one or more predefined categories based on the likelihood expressed by the training set of labeled documents. Many machine learning algorithms plays &nbs...

Download PDF file
  • EP ID EP116595
  • DOI -
  • Views 70
  • Downloads 0

How To Cite

Sourish Mitra, Avijit Chakraborty, Arunabha Bhaumik, Joy Dewanjee, Mainak Maulik (2015).  A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 56-63. https://europub.co.uk/articles/-A-116595