In the last two decades lot of research and development occurs on Location-Based Authentication and Security Services (LBASSs) which allow users to see where their friends are, to search location-tagged content within their local area networks, and to meet others nearby. Previously the data can be accessed from anywhere and any time. Hence lot of unexpected misjudgment were happened due to location independent authentication protocols. The recent availability of open mobile platforms, such as Apple iPhones and any Android phones, makes LBASSs much more accessible to mobile users. After rigorous research funding into this area leads to regulate the access that resources preserved in particular locations. Therefore we improve the development of security from location. We have been study how users share their location in real world, we collected traces from a commercial LBS services operated by a startup company. In this paper, surveyed all algorithm schemes since two decades and bring out detailed analysis over geo encryption, location authentication, location privacy, enhanced location security, User authentication mobility parameters, tolerant distances under smart living applications. To the best of our knowledge, this study fills the gap between old technologies and new technologies and presents fine tuning quantitative analysis of a real-world LBS services. In this paper authors investigate the various key issues and their methodologies for location authentication in WLAN and mobile devices. This paper leaves several ideas for researchers to mitigate issues in location privacy and authentication areas for better future.
The research on the various issues in Mobile ad hoc networks are getting popularity because of its challenging nature and all time connectivity to communicate. MANET is a random deployable network where devices mobile with dynamic topology. In the network topology, each device is termed as a node and the virtual connectivity among each node is termed as the link. Nodes in the network are dynamically organized into virtual partitions called cluster. Network simulators provide the platform to analyze the working of computer networks along with the typical devices, traffic and other entities using ns2. In this paper we analyze and provide ways of how nodes are made for routing after clustering among nodes during simulation.
In the last two decades, the researchers were targeted on the various issues in any general transactions was getting ambiguity in Information Technology domain because of its challenging nature and all overlapping purchases through selling goods during online shopping in government sector. Visual Cryptography gives us the best framework for all services where all authenticated mobile devices through legitimate users get linked and sharing secret keys with goods details with more security. In the paper, each Mobile get acquainted with this proposed framework to enable source to destination goods delivery among users who subscribed in the online shopping cart. Actual Customers want to shop any item from Flipcart, Amazon with unique purchase and selling their belonging without having gray item available in the network is possible through virtual shopping. In the paper to fill gap between old shopping framework and new framework through this techniques by supplementing new techniques inside mobile shopping. Therefore the .legitimate customer gets benefitted while shopping.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.