Han et al., 2007 - Google Patents
Enhancing privacy and authentication for location based service using trusted authorityHan et al., 2007
View PDF- Document ID
- 1963943936921888966
- Author
- Han K
- Kim K
- Publication year
- Publication venue
- 2nd Joint Workshop on Information Security
External Links
Snippet
Not only the privacy but also the authentication is an important issue using the location based serviced in the critical areas, from forging the location information. There are many studies on the privacy, while less number of studies on the authentication of message, which …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2127300B1 (en) | Method and apparatus for securing location information and access control using the location information | |
Petit et al. | Pseudonym schemes in vehicular networks: A survey | |
Shin et al. | AnonySense: A system for anonymous opportunistic sensing | |
US7023995B2 (en) | Secure location-based services system and method | |
Esposito et al. | On data sovereignty in cloud-based computation offloading for smart cities applications | |
JP2010519788A5 (en) | ||
US11743715B2 (en) | Devices, systems and methods for close contact tracing with strong privacy protection | |
Hasan et al. | WORAL: A witness oriented secure location provenance framework for mobile devices | |
Ullah et al. | Privacy‐preserving multilevel obfuscation scheme for vehicular network | |
Prakash et al. | Vanet authentication with privacy-preserving schemes—a survey | |
Manolopoulos et al. | Securing smartphone based ITS | |
CN115529150A (en) | LBS privacy protection method in car networking sparse user environment | |
Ni et al. | A mobile phone‐based physical‐social location proof system for mobile social network service | |
Han et al. | Enhancing privacy and authentication for location based service using trusted authority | |
Ali et al. | Robust cryptographic scheme for reliable data communication in VANET (RCSRC) using clustering approach | |
Lenzini et al. | Selective location blinding using hash chains | |
Punitha et al. | Privacy preservation and authentication on secure geographical routing in VANET | |
Gambs et al. | Locanyms: Towards privacy-preserving location-based services | |
Manolopoulos | Security and privacy in smartphone based intelligent transportation systems | |
JP2007020031A (en) | Integration method of location management and key management | |
Hua et al. | A location authentication scheme based on adjacent users | |
Kaur et al. | Implementation of Secure Authentication Mechanism for LBS using best Encryption Technique on the Bases of performance Analysis of cryptographic Algorithms | |
Mohamed | Secure Position Verification Approach for Wireless Ad-hoc Networks. | |
Chikohora et al. | Location Privacy Protection Techniques for Mobile Location-Based Services. A Survey | |
Harrabi et al. | A vehicle-to-infrastructure communication privacy protocolused Blockchain |