2011 RoEduNet International Conference 10th Edition: Networking in Education and Research 2011
DOI: 10.1109/roedunet.2011.5993705
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing security and confidentiality in location-based data encryption algorithms

Abstract: With rapid growing of mobile networks and devices we can use them to send email, mobile commerce, theatre booking, etc. In such scenario, we need to Secure Communication. Secure communication is possible through encryption of data. However, most of the existent data encryption techniques are location-independent. Data encrypted with such techniques cannot restrict the location and time of data decryption. The concept of "Geoencryption" or "location-based encryption" is being developed for such a purpose. In th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 9 publications
(5 reference statements)
0
6
0
Order By: Relevance
“…Based on Position, Velocity and Time (PVT) of the recipient the Geo-Lock is computed using Geo-Lock mapping function [2]. A new concept of "Geo-encryption" and location-based encryption is developed to overcome the short comings of the above two systems [3]. Confidentiality, authentication, simplicity and practicability of security issues are met by this new encryption technique which uses GPS technology.…”
Section: International Journal Of Advance Engineering and Research Dementioning
confidence: 99%
“…Based on Position, Velocity and Time (PVT) of the recipient the Geo-Lock is computed using Geo-Lock mapping function [2]. A new concept of "Geo-encryption" and location-based encryption is developed to overcome the short comings of the above two systems [3]. Confidentiality, authentication, simplicity and practicability of security issues are met by this new encryption technique which uses GPS technology.…”
Section: International Journal Of Advance Engineering and Research Dementioning
confidence: 99%
“…To protect against tampering and spoofing, a signal authentication protocol, Timed Efficient Stream Loss-tolerant Authentication (TESLA) [8] is designed .Since then many efforts have been done to complete the above idea and fix its defects. To Overcome these defects, Rohollah karimi and Mohammad Kalantari [4] present a modified Geo protocol and improve its efficiency and applicability. Although it is possible to provide security features such as authentication, integrity and confidentiality.…”
Section: Related Workmentioning
confidence: 99%
“…So, for secure communication the concept of "Geo-Encryption" is introduced which is location dependent. It is an enhancement to traditional encryption that makes use of physical location or time as a mean to produce additional security and security features [9]. It allows data to be encrypted for a specific place or broad geographic area, and supports constraints in time as well as location.…”
Section: Introductionmentioning
confidence: 99%
“…Karimi et. al [22] presented a geoencryption protocol which allows the mobile nodes to communicate with each other by restriction when decoding a message in the specific location and time period. Similar technique was applied for mobile devices in [23].…”
Section: Related Workmentioning
confidence: 99%