By Topic

Enhancing security and confidentiality on mobile devices by location-based data encryption

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Karimi, R. ; Dept. of Comput., Qazvin Azad Univ., Qazvin, Iran ; Kalantari, M.

As a result of the fast development in mobile networks and rapid growing of electronic technology, mobile devices can be used for various purposes. Nowadays these devices not only used for telephone communications but also we can use them for many Internet applications, e.g. mobile fund transfer, e-commerce, e-wallet and theater booking. These applications should use of strong encryption techniques for data security. Because mobile devices have low-computation capabilities and limited battery life, it is not suitable to use conventional asymmetric cryptographic techniques, with them. On the other hand, most of the data encryption technology is location-independent and cannot restrict the location of data decryption. In this paper, we try to apply position and time into the encryption and decryption processes so that provides an additional layer of security and present a modified geoencryption protocol that will allow mobile nodes to communicate to each other safely by restrict decoding a message in the specific location and time period. The recipient can decrypt messages if he stays in specific area and limited time. According to our experimental study, the approach can meet the confidentiality, authentication, simplicity, and practicability of security issues. Therefore, the proposed approach is effective and practical for data transmission to mobile users.

Published in:

Networks (ICON), 2011 17th IEEE International Conference on

Date of Conference:

14-16 Dec. 2011