Enhancing Security Using Location And Time

Authors

  • Pradnya Dalvi Computer Engineering, AISSMS’s IOIT
  • Monal Patel Computer Engineering, AISSMS’s IOIT
  • Charuta Dhalpe Computer Engineering, AISSMS’s IOIT
  • Atul Chaudhari Computer Engineering, AISSMS’s IOIT
  • Prof. P.S.Gaikwad Prof., Department of Computer Engineering, AISSMS’s IOIT

Keywords:

Security, location and time, encryption, decryption, mobile nodes, GPS.

Abstract

Now a days mobile networks and devices are growing rapidly, we can use them to send and receive emails,
important documents, photos and electronic media etc. In such cases we need to secure communicated data and to do so
encryption-decryption techniques are use. So these systems cannot withstand the data security and chances of hacking
data is more. Since these systems do not take into account the location and time for decryption. For such purpose the
concept of “Location and Time based encryption” is being used. In this paper, we will enhance the security by adding
additional level of security that is location and time of the receiver. Receiver can only decrypt the message if the user is
present at the location and time specified by sender. This will resolved the security issue.

Published

2022-08-23

How to Cite

Enhancing Security Using Location And Time. (2022). International Journal of Advance Engineering and Research Development (IJAERD), 4(12), -. https://ijaerd.org/index.php/IJAERD/article/view/5875

Similar Articles

1-10 of 2269

You may also start an advanced similarity search for this article.