A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1

Abstract

 Abstract: Independent location based cryptography technique ensures that after transferring encrypted datafrom sending end ,decryption can takes place at anywhere from receiving point of view. But according todemand of mobile users if we want to ensures more security at the time of data transfer in mobilecommunication we need location dependency .It means ,when we encrypt a particular data packet at sendingend and after transmitting that data to the receiver ,the receiver can be able to decrypt that packet only from aparticular location (not from anywhere) specified by the sender by transferring location based coordinate target.In our proposed location based data encryption-decryption approach a target latitude/longitude coordinate isincorporated with a random key for data encryption. The receiver can only decrypt the cipher text when thecoordinate acquired from GPS receiver is matched with target coordinate .The location of a receiver is difficultto exactly match with target coordinate .So we proposed a parameter distance tolerant(DT) in our proposedapproach to increase its practicality. The security analysis shows that to probability to break our proposedalgorithm is almost impossible since the length of the random key is adjustable.

Authors and Affiliations

Sourish Mitra , Avijit Chakraborty , Arunabha Bhaumik , Joy Dewanjee , Mainak Maulik

Keywords

Related Articles

High Efficient Complex Parallelism for Cryptography

Cryptography is an important in security purpose applications. This paper contributes the complex,parallelism mechanism to protect the information by using Advanced Encryption Standard (AES) Technique. AES is an encrypti...

Framework of Security Mechanisms for Monitoring Adaptive Distributed Systems

Abstract: The distributed systems have a noteworthy role in today’s information technology, whether it is governmental or nongovernmental organizations. The major concern of today’s software industry is that dealing with...

 The Use of Non Wood Forest Product as Income Generation inSemi Arid Zone Case Study Umkaddada Locality, North DarfurState, Sudan

 Abstract: The study were carried out at Arais area north Umkaddada town, the objective was to study the nonwood forest products for their role in income generation, type of fruits, Grasses and other parts of treesa...

 Hybrid Algorithm combining Genetic algorithms and CSP approach to plane an Optimized path for a Mobile Robot moving under Time Window

 Abstract: The problems of optimization are considered as a type of a constraint satisfaction problem: COP (Constraint Optimization problem). In this frame goes our first works which are interested in the optimi...

 Implementing High Performance Retrieval Process by Max-Score Ranking

 This paper presents a comparison report of two different processes of retrieving a keyword or data’s from a given database or from a multiple databases. The process1 known as Extended Boolean Retrieval (EBR)model...

Download PDF file
  • EP ID EP116595
  • DOI -
  • Views 76
  • Downloads 0

How To Cite

Sourish Mitra, Avijit Chakraborty, Arunabha Bhaumik, Joy Dewanjee, Mainak Maulik (2015).  A Location Dependent Cryptographic Approach Based on TargetCoordinate & Distance Tolerant Key transfer for GPS mobileReceiver. IOSR Journals (IOSR Journal of Computer Engineering), 17(1), 56-63. https://www.europub.co.uk/articles/-A-116595