[go: up one dir, main page]

Han et al., 2007 - Google Patents

Enhancing privacy and authentication for location based service using trusted authority

Han et al., 2007

View PDF
Document ID
1963943936921888966
Author
Han K
Kim K
Publication year
Publication venue
2nd Joint Workshop on Information Security

External Links

Snippet

Not only the privacy but also the authentication is an important issue using the location based serviced in the critical areas, from forging the location information. There are many studies on the privacy, while less number of studies on the authentication of message, which …
Continue reading at caislab.kaist.ac.kr (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
EP2127300B1 (en) Method and apparatus for securing location information and access control using the location information
Petit et al. Pseudonym schemes in vehicular networks: A survey
Shin et al. AnonySense: A system for anonymous opportunistic sensing
US7023995B2 (en) Secure location-based services system and method
Esposito et al. On data sovereignty in cloud-based computation offloading for smart cities applications
JP2010519788A5 (en)
US11743715B2 (en) Devices, systems and methods for close contact tracing with strong privacy protection
Hasan et al. WORAL: A witness oriented secure location provenance framework for mobile devices
Ullah et al. Privacy‐preserving multilevel obfuscation scheme for vehicular network
Prakash et al. Vanet authentication with privacy-preserving schemes—a survey
Manolopoulos et al. Securing smartphone based ITS
CN115529150A (en) LBS privacy protection method in car networking sparse user environment
Ni et al. A mobile phone‐based physical‐social location proof system for mobile social network service
Han et al. Enhancing privacy and authentication for location based service using trusted authority
Ali et al. Robust cryptographic scheme for reliable data communication in VANET (RCSRC) using clustering approach
Lenzini et al. Selective location blinding using hash chains
Punitha et al. Privacy preservation and authentication on secure geographical routing in VANET
Gambs et al. Locanyms: Towards privacy-preserving location-based services
Manolopoulos Security and privacy in smartphone based intelligent transportation systems
JP2007020031A (en) Integration method of location management and key management
Hua et al. A location authentication scheme based on adjacent users
Kaur et al. Implementation of Secure Authentication Mechanism for LBS using best Encryption Technique on the Bases of performance Analysis of cryptographic Algorithms
Mohamed Secure Position Verification Approach for Wireless Ad-hoc Networks.
Chikohora et al. Location Privacy Protection Techniques for Mobile Location-Based Services. A Survey
Harrabi et al. A vehicle-to-infrastructure communication privacy protocolused Blockchain