Implementation of Secure Authentication Mechanism for LBS Using Best Encryption Technique on The Bases of Performance Analysis of Cryptographic Algorithms

Provided by: Academy & Industry Research Collaboration Center
Topic: Security
Format: PDF
Today's location-sensitive service relies on user's mobile device to determine its location and send the location to the application. With the growth of the importance and of the audience of location-based services, questions of security and privacy are brought forward. As services are being built on top of this technology, the number of parties increases significantly and the possibility of a malicious insider (or a misbehaving insider) emerges. The extent to which the parties care to trust each other has reduced and trust amongst the various parties can no longer be assumed by a location-based service. An attacker may try to steal a service (e.g., claiming to be a client to get free internet access), service providers may gain of private information.

Find By Topic