CFP last date
20 May 2024
Reseach Article

Geographically Secured SSL-VPN Using GPS

by Suresh Limkar, Dhiren Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 10
Year of Publication: 2010
Authors: Suresh Limkar, Dhiren Patel
10.5120/1109-1452

Suresh Limkar, Dhiren Patel . Geographically Secured SSL-VPN Using GPS. International Journal of Computer Applications. 6, 10 ( September 2010), 21-24. DOI=10.5120/1109-1452

@article{ 10.5120/1109-1452,
author = { Suresh Limkar, Dhiren Patel },
title = { Geographically Secured SSL-VPN Using GPS },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 6 },
number = { 10 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume6/number10/1109-1452/ },
doi = { 10.5120/1109-1452 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:55:04.006176+05:30
%A Suresh Limkar
%A Dhiren Patel
%T Geographically Secured SSL-VPN Using GPS
%J International Journal of Computer Applications
%@ 0975-8887
%V 6
%N 10
%P 21-24
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

We are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, for critical applications, such as the military. A formal model for location-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause harm. In this paper, we show how the SSL VPN model can be extended to incorporate the notion of location. We show how this location information can be used to determine whether a subject has access to a given object. A novel improved VPN (Virtual Private Network) system based on geo-secured SSL (Secure Socket Layer) protocol is proposed to overwhelm the defects of traditional SSL VPN. It enhances current security applications granting access to sensible information and privileges to execute orders only to entities that are in a trusted location. This system not only authenticates authorized user but also the location of the user

References
  1. Dorothy E. Denning and Peter F. MacDoran. Location-Based Authentication:Grounding Cyberspace for Better Security. In Proceedings of the Computer Fraud and Security,Elsevier Science Ltd, February1996 .
  2. Alan Freier and Philip Karlton, “The SSL Protocol Version 3.0 ”, http://wp.netscape.com/eng/ssl3 /draft302.txt, Oct.2004.
  3. T. Dierks and C. Allen, “RFC2246: The TLS Protocol Version 1.0”,http://www.ietf.org/rfc/rfc2246.txt, 1999.
  4. Jingli Zhou, Hongtao Xia, Xiaofeng Wang, and Jifeng Yu, “A New VPN Solution Based on Asymmetrical SSL Tunnels”, Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST'06), Nov.2006, pp.71-78
  5. Alshamsi, A. and Saito, T. 2005. “A Technical Comparison of IPSec and SSL”. In Proceedings of the 19th international Conference on Advanced information Networking and Applications - Volume 2 (March 25 - 30, 2005). AINA. IEEE Computer Society, Washington, DC, 395-398. DOI= http://dx.doi.org/10.1109/AINA.2005.70
  6. Zhao Huawei, Liu Ruixia, “A Scheme To Improve Security of SSL” Pacific-Asia Conference on Circuits, Communications and Systems, paccs, pp.401-404, 2009
  7. Byung kwan Lee, Tai-Chi Lee, Seung Hae Yang, "HESSL (Highly Enhanced Security Socket Layer) Protocol," cec, pp.456-460, Seventh IEEE International Conference on E-Commerce Technology (CEC'05), 2005
  8. Lamprecht, C. J. & van Moorsel, A. P. “A.Adaptive SSL: Design, Implementation and Overhead Analysis”,IEEE Computer Society, 2007, 289-294
  9. Ibrahim Hajjeh, Ahmed Serhrouchni, Frédérique Tastet, “ISAKMP Handshake for SSL/TLS” Global Telecommunications Conference, 2003. GLOBECOM '03. IEEE,2003,pp-1481-1485
  10. J. Overbey, W. Traves, and J. Wojdylo, “On the Keyspace of the Hill Cipher,” Cryptologia, January 2005, 29(1), pp. 59–72.
  11. Zhao Huawei, Liu Ruixia, “A Scheme To Improve Security of SSL” Pacific-Asia Conference on Circuits, Communications and Systems, paccs, pp.401-404, 2009.
  12. P. Enge and P. Misra. Scanning the Issues/Technology. Proceedings of the IEEE, Special Issue on GPS, 87(1):11, January 1999.
  13. John A. Volpe National Transportation Systems Center Report. Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System, August 2001.
Index Terms

Computer Science
Information Sciences

Keywords

SSL VPN Geo-encryption Location based security GPS based encryption