Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
    Communities & Collections
    Research Outputs
    Fundings & Projects
    People
    Statistics
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Staff Publications
  3. Scopus
  4. Location-based Cryptographic Techniques: Its Protocols and Parameters
 
  • Details
Options

Location-based Cryptographic Techniques: Its Protocols and Parameters

Journal
Lecture Notes in Mechanical Engineering
Date Issued
2020
Author(s)
Shamsuddin N.S.M.
Sakinah Ali Pitchay 
Universiti Sains Islam Malaysia 
DOI
10.1007/978-981-13-8323-6_7
Abstract
Storing data via online increased rapidly and this massive data has become significant to be secured due to the data invasion. Hence, encryption to transmit data securely in open networks has been applied. However, this single layer of security is insufficient. Location-based cryptographic technique is proposed by adding another layer of security on top of existing encryption method. It requires location information which are latitude and longitude coordinates, time and velocity. Those parameters used to generate an additional encryption and decryption keys for location-based encryption process. Therefore, protocols are required in cryptographic techniques to ensure the security and integrity of data while transit over a network connection. This paper discusses The Geo-encryption Algorithm, Location Dependent Encryption Algorithm (LDEA), Dynamic Toleration Distance (DTD) and Timed, Efficient Stream Loss-tolerant Authentication (TESLA) as the protocols for location-based cryptographic techniques. Its parameter used in that particular protocol and the roles in some applications such as location-based security in digital cinema distribution for sending large media file to multiple theatre locations and location-based authentication in bank cloud storage for accountant access at specific location and timeframe. Springer Nature Singapore Pte Ltd. 2020.
Subjects

Cryptographic protoco...

DTD

LDEA

TESLA

The Geo-encryption Al...

Welcome to SRP

"A platform where you can access full-text research
papers, journal articles, conference papers, book
chapters, and theses by USIM researchers and students.”

Contact:
  • ddms@usim.edu.my
  • 06-798 6206 / 6221
  • USIM Library
Follow Us:
READ MORE Copyright © 2024 Universiti Sains Islam Malaysia