The Ohio State University Corporate Engagement Office

Back to All Technologies

Location Based Encryption for Mobile Networks

College
College of Engineering (COE)
Researchers
Koksal, C. Emre
Gungor, Onur
Licensing Manager
Hampton, Andrew
614-247-9357
hampton.309@osu.edu

T2013-362 Software system which utilizes location between two mobile nodes for the generation of reliable, random and secure key bits.

The Need

As the world becomes more and more connected, the need to secure information between localized components in “sensitive” mobile systems has increased dramatically. As attack vectors become more complex, the need to encrypt what is routine traffic between nodes rises. Examples of this communications traffic include the networks used by municipal first responders, tactical radio systems used by the military, and the data streams between car crash alert systems. This invention presents a novel way of securing these channels by using their location in the generation of the encryption keys that protect them.

The Technology

Researchers at The Ohio State University led by Dr. Can Koksal have developed sophisticated mobile encryption software. The proprietary algorithm is based on location information from two mobile nodes which is then used as a key for encryption devices. This development would add an extra layer of encryption to deter potential eavesdroppers from cracking and then listening in on secured communications. The software can also react to the location of the eavesdropper and postpone communications when the eavesdropper has a geographical advantage where the information could be jeopardized. This software is unique in its approach of using localization information as the random source of information, protecting it from attackers. This research is supported by a grant from NSF, and is continuing into the early stages of development.

Commercial Applications

  • Public sector communications
  • Public venue wireless networks
  • First responder communications
  • Enterprise communications

Benefits/ Advantages

  • Key bits are
    • Random
    • Reliable
    • Secure
  • Enhanced protection from eavesdropping