Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


A Lightweight Digital Signature Cryptographic Protocol for Authentication and Integrity Based on Location

1Gina Gallegos-Garcia, 1Raul A. Flores-Espinoza, 2Horacio Tapia-Recillas, 1Alejandro Valdez-Aguilar and 3Gualberto Aguilar-Torres
1Instituto Politecnico Nacional, ESIME Culhuacan, Av. Sta Ana. 1000. Sn. Fco. Culhuacan, 04430,
2UAM Iztapalapa. Sn. Rafael Atlixco 186, Vicentina, Iztapalapa, 09340,
3Comision Nacional de Seguridad. Secretaria de Gobernacion. Av. Constituyentes #947 Col. Bel
Research Journal of Applied Sciences, Engineering and Technology  2016  5:550-555
http://dx.doi.org/10.19026/rjaset.12.2578  |  © The Author(s) 2016
Received: September ‎21, ‎2015  |  Accepted: November ‎11, ‎2015  |  Published: March 05, 2016

Abstract

The shipping of digital documents, from a sender to a receiver, must keep certain properties, including the authenticity of the source and message integrity. These properties can be achieved through cryptographic protocols, which define the way in which a cryptographic primitive should be used during a communication process. As an additional function to the mentioned properties, GeoLock is a function that is used to add the coordinates of a receiver to the digital signature primitive or to other cryptographic primitives, which helps to prove that such entity is located in the right place and is able to verify a generated signature avoiding antispoof receivers. However, the use of public key cryptographic primitives with the GeoLock function on mobile devices, involves considering the performance of all cryptographic operations together. Considering the aforementioned, in this study a lightweight cryptographic protocol based on the digital signature primitive and GeoLock is presented in order to meet authentication and integrity based on location. The obtained results show that the proposed protocol is more efficient if compared to related works, as less cryptographic operations are required.

Keywords:

Cryptographic protocol, digital signature, geolock, mobile device,


References

  1. Barker, E., W. Barker, W. Burr, W. Polk and M. Smid, 2012. Recommendation for Key Management-Part 1: General (Revision 3). NIST Special Publication 800-57. Computer Security Division (Information Technology Laboratory), National Institute of Standards and Technology, Gaithersburg MD 20899-8930.
    CrossRef    
  2. Hankerson, D., A.J. Menezes and S. Vanstone, 2003. Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc., Secaucus, NJ, USA, pp: 1-147.
  3. Jarusombat, S. and S. Kittitornkun, 2006. Digital signature on mobile devices based on location. Proceeding of the International Symposium on Communications and Information Technologies, pp: 866-870.
    CrossRef    
  4. Lee, B., 2010. Unified public key infrastructure supporting both certificated-based and ID-based cryptography. Proceeding of the International Conference on Availability, Reliability and Security. Dept. of Information Security, Joungbu University, pp: 54-61.
  5. Lei, Y., D. Chen and Z. Jiang, 2004. Generating digital signature on mobile devices. Proceeding of the 18th International Conference on Advanced Information Networking and Applications, pp: 532-535.
  6. Menezes, A.J., S.A. Vanstone and P.C. van Oorschot, 1986. Handbook of Applied Cryptography. CRC Press Inc., Boca Raton, FL, USA, pp: 4, 5, 11, 12, 425, 426.
    CrossRef    
  7. Rivest, R.L., A. Shamir and L. Adleman, 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2): 120-126. http://dl.acm.org/citation.cfm?id=359342.
    CrossRef    Direct Link
  8. Scott, L. and D.E. Denning, 2003. Geo-encryption: Using GPS to enhance data security. GPS World, April 2003, pp: 40-49. http://calhoun.nps.edu/ handle/10945/37168.
    Direct Link
  9. Zhang, Z., W. Susilo and R. Raad, 2008. Mobile ad-hoc network key management with certificateless cryptography. Proceeding of the 2nd International Conference on Signal Processing and Communication Systems (ICSPCS, 2008), pp: 1-10.
    CrossRef    

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved