Skip to main content

Location-based Cryptographic Techniques: Its Protocols and Parameters

  • Conference paper
  • First Online:
RITA 2018

Abstract

Storing data via online increased rapidly and this massive data has become significant to be secured due to the data invasion. Hence, encryption to transmit data securely in open networks has been applied. However, this single layer of security is insufficient. Location-based cryptographic technique is proposed by adding another layer of security on top of existing encryption method. It requires location information which are latitude and longitude coordinates, time and velocity. Those parameters used to generate an additional encryption and decryption keys for location-based encryption process. Therefore, protocols are required in cryptographic techniques to ensure the security and integrity of data while transit over a network connection. This paper discusses TheĀ  Geo-encryption Algorithm, Location Dependent Encryption Algorithm (LDEA), Dynamic Toleration Distance (DTD) and Timed, Efficient Stream Loss-tolerant Authentication (TESLA) as the protocols for location-based cryptographic techniques. Its parameter used in that particular protocol and the roles in some applications such as location-based security in digital cinema distribution for sending large media file to multiple theatre locations and location-based authentication in bank cloud storage for accountant access at specific location and timeframe.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Scott L, Denning DE (2003) A location based encryption technique and some of its applications. In: National technical meeting of the Institute of Navigation, pp 734ā€“740

    Google ScholarĀ 

  2. Al-Ibrahto O, Al-Fuqaha A, Van Dyk D, Akerman N (2007) Mobility support for Geo-Encryption. In: IEEE international conference on communications, pp 1492ā€“1496

    Google ScholarĀ 

  3. Deshpande A, Jagtap M, Kadam S, Chechare A, Dhade P (2015) Security to mobile banking using location based encryption. Int J Adv Res Comput Eng Technol 4:4011ā€“4014

    Google ScholarĀ 

  4. Pitchay SA, Alhiagem WAA, Ridzuan F, Saudi MM (2015) A proposed system concept on enhancing the encryption and decryption method for cloud computing. In: 2015 17th UKSim-AMSS international conference on modelling and simulation (UKSim), pp 201ā€“205

    Google ScholarĀ 

  5. Scott L, Denning DE (2003) A geo-encryption: using GPS to enhance data security

    Google ScholarĀ 

  6. Al-Fuqaha A, Al-Ibrahim O, Rayes A (2007) Geo-encryption protocol for mobile networks. Comput Commun 30:2510ā€“2517

    ArticleĀ  Google ScholarĀ 

  7. Qiu D, Lo S, Enge P, Boneh D (2007) Geoencryption using Loran. In: National technical meeting of the Institute of Navigation, pp 104ā€“115

    Google ScholarĀ 

  8. Abolghasemi MS, Sefidab MM, Atani RE (2013) Using location based encryption to improve the security of data access in cloud computing. In: 2013 international conference on advances in computing, communications and informatics (ICACCI), pp 261ā€“265

    Google ScholarĀ 

  9. Gupta AK, Srivastava A, Goyal TK, Gupta K (2014) A novel security approach using location based RSA encryption. Int J Mod Commun Technol Res 2:38ā€“42

    Google ScholarĀ 

  10. Vandana G, Supriya J, Priya P, Sumedha P (2015) Nalawade: improve security of data access in cloud computing using location. Int J Comput Sci Mob Comput 4:331ā€“340

    Google ScholarĀ 

  11. Kumar S, Murthy N (2015) Location based security of data access in cloud computing using scheduler. Int J Innov Res Comput Commun Eng 3:104ā€“111

    Google ScholarĀ 

  12. Kadam SS, Shinde A, Durge H (2017) Enhancing security and confidentiality for mobile device. Int J Comput Appl 7:67ā€“69

    Google ScholarĀ 

  13. Dalvi P, Patel M, Dhalpe C, Chaudhari A, Gaikwad PS (2017) Enhancing security using location and time. Int J Adv Eng Res Dev Sci J Impact Factor 72:4ā€“6

    Google ScholarĀ 

  14. Liao H-C, Chao Y-H (2008) A new data encryption algorithm based on the location of mobile users. Inf Technol J 7:63ā€“69

    ArticleĀ  Google ScholarĀ 

  15. Sasi SB, Abraham BK, James J, Jose R (2014) Location based encryption using message authentication code in mobile networks. Int J Comp Tech (IJCAT) 1:104ā€“107

    Google ScholarĀ 

  16. Reddy P, Sudha KR, Naidu S (2010) A modified location-dependent image encryption for mobile information system. Int J Eng Sci 2:1060ā€“1065

    Google ScholarĀ 

  17. Hamad H, Elkourd S (2010) Data encryption using the dynamic location and speed of mobile node. J Media Commun Stud 2:67ā€“75

    Google ScholarĀ 

  18. Karimi R (2011) Enhancing security and confidentiality in location-based data encryption algorithms. In: Fourth international conference on applications digital information web technology (ICADIWT), pp 30ā€“35

    Google ScholarĀ 

  19. Karimi R, Kalantari M (2011) Enhancing security and confidentiality on mobile devices by location-based data encryption. In: ICON 2011ā€”17th IEEE international conference on networks, pp 241ā€“245

    Google ScholarĀ 

  20. Kolapwar PG, Ambulgekar PHP (2014) Use of advanced encryption standard to enhance the performance of geo protocol in location based network. Int J Sci Res ISSN (Online Impact Factor. 3, 2888ā€“2890)

    Google ScholarĀ 

  21. Kolapwar PG (2015) An improved geo-encryption algorithm in location based service. IJRET Int J Res Eng Technol 4:547ā€“550

    Google ScholarĀ 

  22. Pant H, Kaushik V, Priyanshi Singhal V (2016) Geo-encryption to access the data using AES algorithm. Int J Eng Appl Sci Technol 1:114ā€“116

    Google ScholarĀ 

Download references

Acknowledgements

This work was supported in part by the Ministry of Higher Education (MOHE) Malaysia under research grant [USIM/FRGS/FST/055002/50217].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nur Syafiqah Mohd Shamsuddin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Ā© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shamsuddin, N.S.M., Pitchay, S.A. (2020). Location-based Cryptographic Techniques: Its Protocols and Parameters. In: P. P. Abdul Majeed, A., Mat-Jizat, J., Hassan, M., Taha, Z., Choi, H., Kim, J. (eds) RITA 2018. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-13-8323-6_7

Download citation

Publish with us

Policies and ethics