info@ijrretas.com
+91 77710 84928 Support
ijrretas LogoIJRRETAS
  • About
    • About The Journal
    • Aim & Scope
    • Privacy Statement
    • Journal Policies
    • Disclaimer
    • Abstracting and Indexing
    • FAQ
  • Current
  • Archive
  • For Author
    • Submit Paper Online
    • Article Processing Charges
    • Submission Guidelines
    • Manuscript Types
    • Download Article Template
    • Download Copyright Form
  • Editorial Board
    • Editorial Board
    • Editors Responsibilities
  • Conference
  • Contact
  • Pay Online
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Data Encryption Model using Geo-Location for Mobile Devices

Authors: Shailesh Raut , Megha Singh, Dr. Rekha Rathore

Certificate: View Certificate

Abstract

Secure communication and authentication is possible through encryption of data and verification . Most of the existing data encryption techniques are locationindependent. Data encrypted with such techniques cannot restrict the location and time of data decryption. The concept of \"Geoencryption and Authentication \" or \" geo location-based encryption and authentication \" is being developed for such a purpose. This paper proposes a survey between different technique to which is related to Geo location based Networks. The purpose of Geo location based network is to secure system from disparate user, so that the right user can take the right decision for the security of the items which are relevant for them. In this paper we are comparing different techniques on different aspects of systems which is used in Geo Location based network.

Introduction

It is an enhancement to traditional encryption that makes use of physical location or time as a mean to produce additional security and security features. It allows data to be encrypted for a specific place or broad geographic area, and supports constraints in time as well as space. It provides full protection against attempts to bypass the location feature. Depending on the Implementation, it can also provide strong protection against location spoofing. The Geoencryption algorithm does not replace any of the conventional cryptographic algorithms, but instead adds an additional layer of security. The capability has tremendous potential benefits to applications such as location-based services, managing secure data and digital movie distribution where controlling access is main concern [2]. Location information has many properties good for encryption and authentication. Logan Scott, Dorothy Denning [1] developed the idea of Geoencryption and its use in digital film distribution. In order to meet the demand of mobile users, Hsien-Chou Liao and YunHsiang Chao introduced a location dependent approach called Location Dependent data Encryption Algorithm (LDEA) [2]. This protocol is not strong enough because they are using the static location which is latitude/longitude coordinates of mobile node and they are using the static tolerance distance to overcome the inaccuracy and inconsistent of GPS receiver

Conclusion

Geo-location is a secured and full proof way to authenticate users or devices.. There is a need of more robust techniques that can be used to find the location efficiently. The survey provided a brief insight to the existing location based authentication techniques. Finally, the survey will be helpful to researchers to build up a startup platform in the field of geo-location based authentication. This paper explains the importance of location based system, corresponding security and Authentication.

Copyright

Copyright © 2025 Shailesh Raut , Megha Singh, Dr. Rekha Rathore. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Download Paper

Paper Id: IJRRETAS41

Publish Date: 2016-08-01

ISSN: 2455-4723

Publisher Name: ijrretas

About ijrretas

ijrretas is a leading open-access, peer-reviewed journal dedicated to advancing research in applied sciences and engineering. We provide a global platform for researchers to disseminate innovative findings and technological breakthroughs.

ISSN
2455-4723
Established
2015

Quick Links

Home Submit Paper Author Guidelines Editorial Board Past Issues Topics
Fees Structure Scope & Topics Terms & Conditions Privacy Policy Refund and Cancellation Policy

Contact Us

Vidhya Innovative Technology 514, Pukhraj Corporate Navlakha, Indore (M.P) - India

info@ijrretas.com

+91 77710 84928

www.ijrretas.com

Indexed In
Google Scholar Crossref DOAJ ResearchGate CiteFactor
© 2026 ijrretas. All Rights Reserved.
Privacy Policy Terms of Service