4th International Conference on Cryptography and Information Security (CRIS 2018)

February 24~25, 2018, Dubai, UAE

Accepted Papers


  • PERTURBED ANONYMIZATION: TWO LEVEL SMART PRIVACY FOR LBS MOBILE USERS
    Ruchika Gupta,1 Udai Pratap Rao2 and Manish Kumar3
    1,2,3Department of Computer Engineering, S. V. National Institute of Technology, Surat, Gujarat, India
    ABSTRACT

    The use of smart mobile devices like tablets, smart phones and navigational gadgets provide most promising communication and better services to mobile users. Location Based Services (LBS) have become very common in recent years. Mobile users submit their location dependent queries to the untrusted LBS server to acquire a particular service. Ideally, user's personal information such as location data is supposed to be protected while communicating to LBS and at the same time quality of service must be maintained. Therefore, there is a need to have a balanced trade-off between privacy and quality of service. To fulfil such trade-off, this paper proposes a solution that first forms the cloaking region at mobile device, perform perturbation to handle the problem of trusted third party and the anonymizer further anonymizes the location to remove the problem of enough users required to form the cloaking region. The proposed approach protects the location privacy of the user and also maintains the quality of service by selecting appropriate service to the particular user. The proposed algorithm provides two-level location protection to the user, and thus ensures smart mobility of the LBS user.

  • PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR NETWORKS
    Kaushal Shah1and Devesh C. Jinwala2
    1,2Department of Computer Engineering, S. V. National Institute of Technology, Surat, India
    ABSTRACT

    The linear and grid based Wireless Sensor Networks (WSN) are formed by applications where objects being monitored are either placed in linear or grid based form. E.g. monitoring oil, water or gas pipelines; perimeter surveillance; monitoring traffic level of city streets, goods warehouse monitoring. The security of data is a critical issue for all such applications and as the devices used for the monitoring purpose have several resource constraints (bandwidth, storage capacity, battery life); it is significant to have a lightweight security solution. Therefore, we consider symmetric key based solutions proposed in the literature as asymmetric based solutions require more computation, energy and storage of keys. We analyse the symmetric ciphers with respect to the performance parameters: RAM, ROM consumption and number of CPU cycles. We perform this simulation analysis in Contiki Cooja by considering an example scenario on two different motes namely: Sky and Z1. The aim of this analysis is to come up with the best suited symmetric key based cipher for the linear and grid based WSN.