Towards a secure and efficient location-based secret sharing protocol

Alexey Gorodetskiy, Andrey Serebryakov, Alma Oracevic, Rasheed Hussain, S. M. Ahsan Kazmi

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Abstract

Location-based encryption enhances security through integration of location data which is based on Global Positioning System (GPS) coordinates into encryption and decryption processes. It allows data to be decrypted only at specific location(s) or within a specific area. However, this approach strictly relies on self-checked location data which can be easily bypassed. In this paper, we present an analysis of the security of the existing location-based key exchange methods together with our proposed improvements. Furthermore, we propose a novel method based on the existence of a Trusted Third Party (TTP). A TTP is an entity trusted by both sides and the location tracking is entrusted to a TTP rather than a client. We also demonstrate a working proof-of-concept for the proposed approach.

Original languageEnglish
Title of host publication2020 International Symposium on Networks, Computers and Communications, ISNCC 2020
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
ISBN (Electronic)9781728156286
DOIs
Publication statusPublished - 20 Oct 2020
Event2020 International Symposium on Networks, Computers and Communications, ISNCC 2020 - Montreal, Canada
Duration: 20 Oct 202022 Oct 2020

Publication series

Name2020 International Symposium on Networks, Computers and Communications, ISNCC 2020

Conference

Conference2020 International Symposium on Networks, Computers and Communications, ISNCC 2020
Country/TerritoryCanada
CityMontreal
Period20/10/2022/10/20

Bibliographical note

Publisher Copyright:
© 2020 IEEE.

Keywords

  • Geolock-Based Encryption
  • Location-Based Encryption
  • Location-Based Key Exchange
  • Secret Sharing
  • Security
  • Trusted Third Party (TTP)

Fingerprint

Dive into the research topics of 'Towards a secure and efficient location-based secret sharing protocol'. Together they form a unique fingerprint.

Cite this