2007
DOI: 10.1016/j.comcom.2007.04.016
|View full text |Cite
|
Sign up to set email alerts
|

Geo-encryption protocol for mobile networks

Abstract: We propose a geo-encryption protocol that allows mobile nodes to communicate securely by restricting the decryption of a message to a particular location and time period. Our protocol will handle the exchange of movement parameters, so that a sender is able to geoencrypt messages to a moving decryption zone that contains a mobile node's estimated location. We also present methods for estimating the node's movement parameters to allow for geo-encryption. Finally, we evaluate our model by measuring the induced o… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 5 publications
(5 reference statements)
0
12
0
Order By: Relevance
“…The idea of location-based encryption is further used by many researchers in their scheme to enhance security. Ala Al-Fuqaha, Omar Al-Ibrahim [17] they use Geo-Encryption to ensure that message are exchanged between mobile nodes securely, by allowing the decryption of the message at the specified location and time.…”
Section: Related Workmentioning
confidence: 99%
“…The idea of location-based encryption is further used by many researchers in their scheme to enhance security. Ala Al-Fuqaha, Omar Al-Ibrahim [17] they use Geo-Encryption to ensure that message are exchanged between mobile nodes securely, by allowing the decryption of the message at the specified location and time.…”
Section: Related Workmentioning
confidence: 99%
“…Rules specify the context that needs to be taken into account, i.e. rules could be based on the sender and receiver's location [2]- [4], IP address as well as other contexts [5]. The rules and facts, on decryption are used to make a decision about whether the receiver can be allowed to decrypt the content or not.…”
Section: The Approachmentioning
confidence: 99%
“…Al-Fuqaha and O. Al-Ibrahim [2] explored the concept of GPS-based encryption and adds a layer of security to the traditional cryptographic methods by restricting decryption based on the location and time period of decryption. The decrypter is required to obtain a geo-secured decryption key in the specified time period to be able to decrypt the content.…”
Section: Introductionmentioning
confidence: 98%
“…In turn, LBE requires that this is only possible if the receiver's device is physically present at location L, or respectively inside an geographic area associated with L. Location verification hinges on a tamper-resistant GPS receiver inside the recipient's mobile device. In LBE, the sender has to transmit parameters which define the area where decryption is permitted and may specify further dynamic constraints like time periods or receiver velocity that have to verified upon decryption [31]. In general, location-based encryption techniques require an efficient mapping from location areas to symmetric keys, which is called location lock in the following.…”
Section: Location-based Encryptionmentioning
confidence: 99%