Abstract
Storing data via online increased rapidly and this massive data has become significant to be secured due to the data invasion. Hence, encryption to transmit data securely in open networks has been applied. However, this single layer of security is insufficient. Location-based cryptographic technique is proposed by adding another layer of security on top of existing encryption method. It requires location information which are latitude and longitude coordinates, time and velocity. Those parameters used to generate an additional encryption and decryption keys for location-based encryption process. Therefore, protocols are required in cryptographic techniques to ensure the security and integrity of data while transit over a network connection. This paper discusses TheĀ Geo-encryption Algorithm, Location Dependent Encryption Algorithm (LDEA), Dynamic Toleration Distance (DTD) and Timed, Efficient Stream Loss-tolerant Authentication (TESLA) as the protocols for location-based cryptographic techniques. Its parameter used in that particular protocol and the roles in some applications such as location-based security in digital cinema distribution for sending large media file to multiple theatre locations and location-based authentication in bank cloud storage for accountant access at specific location and timeframe.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Scott L, Denning DE (2003) A location based encryption technique and some of its applications. In: National technical meeting of the Institute of Navigation, pp 734ā740
Al-Ibrahto O, Al-Fuqaha A, Van Dyk D, Akerman N (2007) Mobility support for Geo-Encryption. In: IEEE international conference on communications, pp 1492ā1496
Deshpande A, Jagtap M, Kadam S, Chechare A, Dhade P (2015) Security to mobile banking using location based encryption. Int J Adv Res Comput Eng Technol 4:4011ā4014
Pitchay SA, Alhiagem WAA, Ridzuan F, Saudi MM (2015) A proposed system concept on enhancing the encryption and decryption method for cloud computing. In: 2015 17th UKSim-AMSS international conference on modelling and simulation (UKSim), pp 201ā205
Scott L, Denning DE (2003) A geo-encryption: using GPS to enhance data security
Al-Fuqaha A, Al-Ibrahim O, Rayes A (2007) Geo-encryption protocol for mobile networks. Comput Commun 30:2510ā2517
Qiu D, Lo S, Enge P, Boneh D (2007) Geoencryption using Loran. In: National technical meeting of the Institute of Navigation, pp 104ā115
Abolghasemi MS, Sefidab MM, Atani RE (2013) Using location based encryption to improve the security of data access in cloud computing. In: 2013 international conference on advances in computing, communications and informatics (ICACCI), pp 261ā265
Gupta AK, Srivastava A, Goyal TK, Gupta K (2014) A novel security approach using location based RSA encryption. Int J Mod Commun Technol Res 2:38ā42
Vandana G, Supriya J, Priya P, Sumedha P (2015) Nalawade: improve security of data access in cloud computing using location. Int J Comput Sci Mob Comput 4:331ā340
Kumar S, Murthy N (2015) Location based security of data access in cloud computing using scheduler. Int J Innov Res Comput Commun Eng 3:104ā111
Kadam SS, Shinde A, Durge H (2017) Enhancing security and confidentiality for mobile device. Int J Comput Appl 7:67ā69
Dalvi P, Patel M, Dhalpe C, Chaudhari A, Gaikwad PS (2017) Enhancing security using location and time. Int J Adv Eng Res Dev Sci J Impact Factor 72:4ā6
Liao H-C, Chao Y-H (2008) A new data encryption algorithm based on the location of mobile users. Inf Technol J 7:63ā69
Sasi SB, Abraham BK, James J, Jose R (2014) Location based encryption using message authentication code in mobile networks. Int J Comp Tech (IJCAT) 1:104ā107
Reddy P, Sudha KR, Naidu S (2010) A modified location-dependent image encryption for mobile information system. Int J Eng Sci 2:1060ā1065
Hamad H, Elkourd S (2010) Data encryption using the dynamic location and speed of mobile node. J Media Commun Stud 2:67ā75
Karimi R (2011) Enhancing security and confidentiality in location-based data encryption algorithms. In: Fourth international conference on applications digital information web technology (ICADIWT), pp 30ā35
Karimi R, Kalantari M (2011) Enhancing security and confidentiality on mobile devices by location-based data encryption. In: ICON 2011ā17th IEEE international conference on networks, pp 241ā245
Kolapwar PG, Ambulgekar PHP (2014) Use of advanced encryption standard to enhance the performance of geo protocol in location based network. Int J Sci Res ISSN (Online Impact Factor. 3, 2888ā2890)
Kolapwar PG (2015) An improved geo-encryption algorithm in location based service. IJRET Int J Res Eng Technol 4:547ā550
Pant H, Kaushik V, Priyanshi Singhal V (2016) Geo-encryption to access the data using AES algorithm. Int J Eng Appl Sci Technol 1:114ā116
Acknowledgements
This work was supported in part by the Ministry of Higher Education (MOHE) Malaysia under research grant [USIM/FRGS/FST/055002/50217].
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Ā© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shamsuddin, N.S.M., Pitchay, S.A. (2020). Location-based Cryptographic Techniques: Its Protocols and Parameters. In: P. P. Abdul Majeed, A., Mat-Jizat, J., Hassan, M., Taha, Z., Choi, H., Kim, J. (eds) RITA 2018. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-13-8323-6_7
Download citation
DOI: https://doi.org/10.1007/978-981-13-8323-6_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8322-9
Online ISBN: 978-981-13-8323-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)