Académique Documents
Professionnel Documents
Culture Documents
Abstract: The wide spread use of WLAN (Wireless LAN) and transfer of credit card information, financial details and
the popularity of mobile devices increases the frequency of data other important documents.
transmission among mobile users. In such scenario, a need for The basic goal of most cryptographic system is to transmit
Secure Communication arises. Secure communication is some data, termed the plaintext, in such a way that it cannot
possible through encryption of data. A lot of encryption be decoded by unauthorized agents[5][6][7][8][9]. This is
techniques have evolved over time. However, most of the data done by using a cryptographic key and algorithm to convert
encryption techniques are location-independent. Data encrypted
the plaintext into encrypted data or cipher text. Only
with such techniques can be decrypted anywhere. The
encryption technology cannot restrict the location of data
authorized agents should be able to convert the cipher text
decryption. GPS-based encryption (or geo-encryption) is an back to the plaintext.
innovative technique that uses GPS-technology to encode GPS-based encryption (or geo-encryption) is an innovative
location information into the encryption keys to provide location technique that uses GPS-technology to encode location
based security. In this paper a location-dependent approach is information into the encryption keys to provide location
proposed for mobile information system. The mobile client based security[12][13][14][15]. GPS-based encryption adds
transmits a target latitude/longitude coordinate and an LDEA another layer of security on top of existing encryption
key is obtained for data encryption to information server. The methods by restricting the decryption of a message to a
client can only decrypt the ciphertext when the coordinate particular location. It can be used with both fixed and
acquired form GPS receiver matches with the target coordinate. mobile.
For improved security, a random key (R-key) is incorporated in
The terms location-based encryption or geo-encryption are
addition to the LDEA key. The cipher text is obtained by
used to refer to any method of encryption in which the
interlacing , permuting and rotating based on the R-key.
encrypted information, called cipher text, can be decrypted
Keywords: data security, location-based key, mobile security, only at a specified location. If, someone attempts to decrypt
random generator, permutation the data at another location, the decryption process fails and
reveals no details about the original plaintext information.
The device performing the decryption determines its
1. Introduction
location using some type of location sensor such as a GPS
The dominant trend in telecommunications in recent years
receiver. Location-based encryption can be used to ensure
is towards mobile communication. The next generation
that data cannot be decrypted outside a particular facility -
network will extend today’s voice-only mobile networks to
for example, the headquarters of a government agency or
multi-service networks, able to carry data and video services
corporation or an individual's office or home. Alternatively,
alongside the traditional voice services. Wireless
it may be used to confine access to a broad geographic
communication is the fastest growing segment of
region. Time as well as space constraints can be placed on
communication industry. Wireless became a commercial
the decryption location.
success in early 1980’s with the introduction of cellular
Adding security to transmissions uses location-based
systems. Today wireless has become a critical business tool
encryption to limit the area inside which the intended
and a part of everyday life in most developed countries.
recipient can decrypt messages. The latitude/longitude
Applications of wireless range from common appliances that
coordinate of node B is used as the key for the data
are used everyday, such as cordless phones, pagers, to high
encryption in LDEA. When the target coordinate is
frequency applications such as cellular phones. The
determined, using GPS receiver, for data encryption, the
widespread deployment of cellular phones based on the
ciphertext can only be decrypted at the expected location. A
frequency reuse principle has clearly indicated the need for
toleration distance(TD) is designed to overcome the
mobility and convenience. The concept of mobility in
inaccuracy and inconsistent problem of GPS receiver. The
application is not only limited to voice transfer over the
sender can also determine the TD and the receiver can
wireless media, but also data transfer in the form of text ,
decrypt the ciphertext within the range of TD. Denning’s
alpha numeric characters and images which include the
model is effective when the sender of a message knows the
(IJCNS) International Journal of Computer and Network Security, 87
Vol. 2, No. 5, May 2010
6. Acknowledgements:
This work was supported by grants from the All India
Council for Technical Education (AICTE) project under
RPS Scheme under file No. F.No.8023/BOR/RID/RPS-
114/2008-09.
References
Authors Profile