Secured Location-Based Rewarding System by using the user Digital Signature (SLBRDS)
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016

Secured Location-Based Rewarding System by using the user Digital Signature (SLBRDS)

Rubina Ashfaque Shah, Dr. Rahat Khan

In the past few years the explosion of mobile devices has motivated the mobile marketing to surge. In recent few years the new type of mobile marketing term as mobile location based services has attracted strong attention. Regrettably, current MLB techniques have a lot of limitations and raise many concerns, especially about the security and privacy of the system. Here we proposed a novel location based rewarding system which termed as SLBRDS. In this system mobile user can gather area base tokens from the token wholesalers, and then exchange their collected tokens at token collectors for beneficial rewards. Here, develop a security and privacy aware location based rewarding protocol for the SLBRDS system, and proves the completeness and soundness of the protocol. Furthermore, we also shows that the proposed system is capable to flexible different assaults and versatile client security can be well protected. Also for the security purpose in our framework the trusted third party who at first authenticate or registered the mobile users trace the digital signature of the mobile user. When the mobile user request for the token to the token distributors, token distributor checks the digital signature of the mobile user, token collector also checks the digital signature of the mobile user when versatile client demand for token to the token gatherer. In the proposed system we detect an attack by tracing the IP address of the attacker.

Keywords: Mobile location-based services, security, privacy, digital signature

Edition: Volume 5 Issue 2, February 2016

Pages: 1072 - 1077

Share this Article

How to Cite this Article?

Rubina Ashfaque Shah, Dr. Rahat Khan, "Secured Location-Based Rewarding System by using the user Digital Signature (SLBRDS)", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161362, Volume 5 Issue 2, February 2016, 1072 - 1077

105 PDF Views | 91 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Mobile location-based services'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 61 - 64

Client's Location Hiding in Geosocial Recommendation Applications

Khadke Shriram Bhanudasrao, Mahadik Pravin B.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3033 - 3035

A Survey on Security and Privacy Based Location Based Recompense Scheme

Prema. S. Patil Wankhede, M. K Kodmelwar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 9, September 2016

Pages: 709 - 713

Secured Location-Based Rewarding System Using Digital Signature (SLBRDS)

Rubina Ashfaque Shah, Dr. Rahat Khan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1030 - 1035

Functional Context Awareness: Measuring and Utilizing the Context Dependency of Mobile Usage

Swati S. Gore, Prachi A. Joshi

Share this Article

Similar Articles with Keyword 'security'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2067 - 2068

An Analysis of Mobile Applications Security; Issue and Aspects from the User's Perspective

Ashish A Kulkarni, Dr. Shivaji R. Madan

Share this Article

Similar Articles with Keyword 'privacy'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on User's Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Similar Articles with Keyword 'digital signature'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1475 - 1480

Secure Digital Signature Scheme against Chosen Message Attacks

Maheshkumar Zilla, K. Raghavendra Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 517 - 521

Implementation of Digital Signature Verification Using Relative Slope Algorithm

P. N. Ganorkar, Kalyani Pendke, Hemant Turkar

Share this Article
Top