International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Information Technology | India | Volume 3 Issue 7, July 2014

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

The ?location-based encryption? is a security algorithm that limits the access or decryption of information content to specified locations and/or times. This algorithm does not replace any of the conventional cryptographic algorithms, but instead adds an additional layer of security to exist stack. GSM is chosen as a case study to implement geo-encryption in its key generation part due to its many properties that are beneficial to this protocol. GSM's BTSs are distributed across the network and their signal can reach places like urban canyons and indoor environments inside the network. In GSM, data stream between mobile subscriber (MS) and BTS is encrypted by A5 encryption algorithm. A5's encryption and decryption key (kc) is generated base on MS's SIM card parameter (ki) and a random number, RAND. At this project we have used MS's location information to generate this key by location based encryption algorithm idea. Encrypted data only in the MS's location, that just GSM network is aware of it, can be decrypted and its accuracy depends on used positioning algorithm.

Keywords: BTS, MS, PVT, IMSI, HLR, SIM, SRES, AUC, BSC, CGI, LAI, MCC, MNC, LAC, MSC, VLR

Edition: Volume 3 Issue 7, July 2014

Pages: 1360 - 1367


How to Cite this Article?

Vijay S. More, Uma R. Godase, "Implementation of Location based Encryption in GSM Cellular Network using OPNET ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=201412711, Volume 3 Issue 7, July 2014, 1360 - 1367

28 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'BTS'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Research Paper, Information Technology, Kenya, Volume 3 Issue 11, November 2014

Pages: 995 - 999

A Donor Information Needs Driven Approach to Address Kenya?s Declining Blood Donations

Ireri Salome, Waiganjo Peter, Orwa Daniel

Share this article

Review Papers, Information Technology, Bangladesh, Volume 8 Issue 7, July 2019

Pages: 929 - 937

Cellular Mobile Technologies (1G to 5G) and Massive MIMO

MD. Hasan Mahmud

Share this article



Similar Articles with Keyword 'MS'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 9 Issue 6, June 2020

Pages: 424 - 426

Possible Misleading Information Identification from News Using Text Analysis

Dobariya Vipula V.

Share this article

Research Paper, Information Technology, Nigeria, Volume 5 Issue 5, May 2016

Pages: 2051 - 2058

ICTs and Child Labour in Nigeria: Patterns, Implications and Prevention Strategies

Jimoh Femi Olatunji, Amah Nnachi Lofty, Dr. Oyedemi Jacob

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2441 - 2444

Privacy-Preservation of Centralized and Distributed Social Network by Using L-Diversity Algorithm

Shankaranand, P. Rajasekar

Share this article

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this article

Survey Paper, Information Technology, India, Volume 5 Issue 4, April 2016

Pages: 1865 - 1867

Survey on Cloud Computing Security Algorithms

Akash Kanthale, S. P. Potdar

Share this article



Similar Articles with Keyword 'HLR'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Review Papers, Information Technology, Bangladesh, Volume 8 Issue 7, July 2019

Pages: 929 - 937

Cellular Mobile Technologies (1G to 5G) and Massive MIMO

MD. Hasan Mahmud

Share this article



Similar Articles with Keyword 'SIM'

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2049 - 2054

Securing TCP/IP Stacks Using IP Tables

Hamisu I. Usman, J. Dharani

Share this article

Research Paper, Information Technology, China, Volume 5 Issue 2, February 2016

Pages: 1855 - 1858

Bandwidth Utilization Optimization on Agent Based CR Networks

Aladje Umaro Balde, Cui Lin

Share this article

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 2036 - 2041

Selective Scheduling Based on Number of Processor Cores for Parallel Processing

Ravinder Jeet, Upasna Garg

Share this article



Similar Articles with Keyword 'AUC'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Research Paper, Information Technology, Kenya, Volume 5 Issue 2, February 2016

Pages: 1723 - 1725

An E-Government-Integration Framework for County Governments in Kenya

Florence K. Maweu, Josphat Karani

Share this article

Research Paper, Information Technology, Indonesia, Volume 8 Issue 4, April 2019

Pages: 225 - 232

Determining Critical Factors of E-Government Use

Mariati, Euphrasia Susy Suhendra

Share this article

Research Paper, Information Technology, United Kingdom, Volume 7 Issue 9, September 2018

Pages: 1 - 11

Relevance of Big Data Analytics in Agriculture: Focus on Nigeria Agricultural Sector

Ehizogie Omo-Ojugo

Share this article



Similar Articles with Keyword 'BSC'

Case Studies, Information Technology, Nigeria, Volume 6 Issue 3, March 2017

Pages: 1881 - 1885

Reliable Internet Connectivity for Relay of Live Broadcasts to Satellite from Remote Tropical Areas: Lessons from a GSM Link Aggregation Solution

Wilson Nwankwo PhD

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Informative Article, Information Technology, Ethiopia, Volume 3 Issue 3, March 2014

Pages: 35 - 40

Concept of Eritrean Academic-Public Library Consortia: A Step toward the Information Society of an African Nation

Yogesh Bajpai

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1743 - 1746

Hybrid Approach for Outlier Detection in High Dimensional Dataset

Rohini Balkrishna Gurav, Sonali Rangdale

Share this article

Case Studies, Information Technology, India, Volume 3 Issue 9, September 2014

Pages: 1784 - 1786

Child Pornography: A Nuisance

Vinod Kapoor, Priya Nagpal

Share this article



Similar Articles with Keyword 'CGI'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Research Paper, Information Technology, Nigeria, Volume 4 Issue 4, April 2015

Pages: 2635 - 2641

Design and Implementation of a Career Guide Information System for Secondary School Leavers An Object Oriented Approach

Ojekudo Nathaniel Akpofure Ph.D, Tombari Tete

Share this article



Similar Articles with Keyword 'LAI'

Informative Article, Information Technology, Nigeria, Volume 3 Issue 11, November 2014

Pages: 24 - 32

Deployment of ICT for Effective Transportation System in Nigeria: A Design model of Nigerian Intelligent Transportation System

Amadi E.C., Ahaiwe J., Etus C., Akpabio N

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1254 - 1256

Security in Multimedia Cloud Computing Using Encryption Algorithms: A Survey

Gemini Garg, Jaspreet Kaur

Share this article

Survey Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 747 - 750

A Survey on Shoulder Surfing Resistant Text Based Graphical Password Schemes

Mokal P. H., Devikar R. N.

Share this article

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2313 - 2316

Web Application:(with) HoneyWords and HoneyEncryption

Harish Reddy B, Beatrice Ssowmiya J

Share this article



Similar Articles with Keyword 'MCC'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Research Paper, Information Technology, Nigeria, Volume 4 Issue 9, September 2015

Pages: 637 - 641

Artificial Neuron Network Implementation of Boolean Logic Gates by Perceptron and Threshold Element as Neuron Output Function

Ele Sylvester I., Adesola W. A.

Share this article



Similar Articles with Keyword 'MNC'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Research Paper, Information Technology, India, Volume 8 Issue 9, September 2019

Pages: 1124 - 1127

Information Technology and its Role in India?s Economic Development

Abhishek Saxena, Pooja Darda

Share this article



Similar Articles with Keyword 'LAC'

Research Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 2036 - 2041

Selective Scheduling Based on Number of Processor Cores for Parallel Processing

Ravinder Jeet, Upasna Garg

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2137 - 2142

Multiple Prevention Techniques for Different Attacks in Web Application

Tejal V. Kasture, Pinaki P. Dixit, Pooja S. Ovhal, Gayatri Sathe, Neelam A. Zambre

Share this article

Research Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1920 - 1924

Improving Stability, Smoothing and Diversifying of Recommender Systems

Sagar Sontakke, Pratibha Chavan

Share this article

Review Papers, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 461 - 465

Data Hiding Using Steganography: A Review

Nishigandha P. Mangle, Prof. Sanjay S. Dhopte

Share this article

Informative Article, Information Technology, Nigeria, Volume 3 Issue 11, November 2014

Pages: 24 - 32

Deployment of ICT for Effective Transportation System in Nigeria: A Design model of Nigerian Intelligent Transportation System

Amadi E.C., Ahaiwe J., Etus C., Akpabio N

Share this article



Similar Articles with Keyword 'MSC'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Review Papers, Information Technology, Bangladesh, Volume 8 Issue 7, July 2019

Pages: 929 - 937

Cellular Mobile Technologies (1G to 5G) and Massive MIMO

MD. Hasan Mahmud

Share this article



Similar Articles with Keyword 'VLR'

Research Paper, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1360 - 1367

Implementation of Location based Encryption in GSM Cellular Network using OPNET

Vijay S. More, Uma R. Godase

Share this article

Review Papers, Information Technology, Bangladesh, Volume 8 Issue 7, July 2019

Pages: 929 - 937

Cellular Mobile Technologies (1G to 5G) and Massive MIMO

MD. Hasan Mahmud

Share this article
Top