Options
Location-based Cryptographic Techniques: Its Protocols and Parameters
Journal
Lecture Notes in Mechanical Engineering
Date Issued
2020
Author(s)
Shamsuddin N.S.M.
Pitchay S.A.
DOI
10.1007/978-981-13-8323-6_7
Abstract
Storing data via online increased rapidly and this massive data has become significant to be secured due to the data invasion. Hence, encryption to transmit data securely in open networks has been applied. However, this single layer of security is insufficient. Location-based cryptographic technique is proposed by adding another layer of security on top of existing encryption method. It requires location information which are latitude and longitude coordinates, time and velocity. Those parameters used to generate an additional encryption and decryption keys for location-based encryption process. Therefore, protocols are required in cryptographic techniques to ensure the security and integrity of data while transit over a network connection. This paper discusses The Geo-encryption Algorithm, Location Dependent Encryption Algorithm (LDEA), Dynamic Toleration Distance (DTD) and Timed, Efficient Stream Loss-tolerant Authentication (TESLA) as the protocols for location-based cryptographic techniques. Its parameter used in that particular protocol and the roles in some applications such as location-based security in digital cinema distribution for sending large media file to multiple theatre locations and location-based authentication in bank cloud storage for accountant access at specific location and timeframe. � Springer Nature Singapore Pte Ltd. 2020.