About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I

Research Article

An Authentication Algorithm for Sets of Spatial Data Objects

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-64948-6_23,
        author={Wenhao Li and Chengliang Wang and Xiaobing Hu and Hongwen Zhou and Hang Zeng and Yanai Wang},
        title={An Authentication Algorithm for Sets of Spatial Data Objects},
        proceedings={Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I},
        proceedings_a={SECURECOMM},
        year={2024},
        month={10},
        keywords={Data Protection Data Authentication Spatial Data objects Hash Function Hash Authentication},
        doi={10.1007/978-3-031-64948-6_23}
    }
    
  • Wenhao Li
    Chengliang Wang
    Xiaobing Hu
    Hongwen Zhou
    Hang Zeng
    Yanai Wang
    Year: 2024
    An Authentication Algorithm for Sets of Spatial Data Objects
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-64948-6_23
Wenhao Li1, Chengliang Wang1,*, Xiaobing Hu2, Hongwen Zhou, Hang Zeng, Yanai Wang
  • 1: College of Computer Science
  • 2: College of Mathematics and Statistics
*Contact email: Wangcl@cqu.edu.cn

Abstract

Data play a pivotal role in supporting both national economic development and scientific research, and ensuring their authenticity and integrity has become a key concern for scholars. To this end, various authentication algorithms, such as digital signatures, message authentication codes, and hash functions have been proposed. Many of these algorithms treat data as a unity, which can lead to different authentication results if the elements order of the data changes. However, spatial data object is a point set that lack a predetermined order, varying data acquisition and management systems used by operators may result in the same data appearing in different orders, and these approaches are no longer effective. Therefore, this study proposes an authentication algorithm for spatial data objects based on set nature. We consider spatial data objects as a data set, and each element in set will be transferred into a string data. Then, we use hash function SHA to compute each string data, and perform XOR operation to obtain messageM. Finally, the final hash code is obtained by computingMusing the SHA. Through tampering experiments, it has been shown this algorithm has the property of ignoring the data order, good sensitivity, diffusion, confusion, and security. This algorithm can overcome the limitations that rely on data order, contribute to improving the authentication process for spatial data objects, and enhance data integrity and reliability in various applications.

Keywords
Data Protection Data Authentication Spatial Data objects Hash Function Hash Authentication
Published
2024-10-13
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-64948-6_23
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL