%0 Journal Article %T A Survey on Location Based Authentication Protocols For Mobile Devices %A Smruti. P. Patil %A S.U. Nimbhorkar %J International Journal of Computer Science and Network %D 2013 %I IJCSN publisher %X As per the recent studies, the volatile growth has been seen inthe use of mobile devices as the supporting technology foraccessing Internet based services, as well as for personalcommunication needs in networking. Various studies indicatethat it is impossible to utilize strong cryptographic functions forimplementing security protocols on mobile devices. Ourresearch negates this. Explicitly, a performance analysis focusedon the most commonly used cryptographic protocols based onthe location address (latitude & longitude) of the user for mobileapplications and anticipated provably secure authenticationprotocol that is more efficient than any of the existingauthentication protocol is being discussed in this paper.Understanding the use of public key cryptography which makespotential use of discrete logarithms problem. The security ofECC depends on the difficulty of Elliptic Curve DiscreteLogarithm. To provide secure communication for mobiledevices, authenticated protocol is an important primitive forestablishing trusted connection. In this paper, it has beenstudied that the location based system provides a better securityand acquires much less energy consumption than the existingauthentication protocols. %K Elliptic curve cryptography %K location based cryptography and authentication %U http://ijcsn.org/IJCSN-2013/2-1/IJCSN-2013-2-1-27.pdf