Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN’s and Mobile Devices

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
P. Sanyasi Naidu, Jagadish Gurrala

Sanyasi P Naidu and Jagadish Gurrala. Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN’s and Mobile Devices. International Journal of Computer Applications 146(8):12-17, July 2016. BibTeX

	author = {P. Sanyasi Naidu and Jagadish Gurrala},
	title = {Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN’s and Mobile Devices},
	journal = {International Journal of Computer Applications},
	issue_date = {July 2016},
	volume = {146},
	number = {8},
	month = {Jul},
	year = {2016},
	issn = {0975-8887},
	pages = {12-17},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2016910829},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


In the last two decades lot of research and development occurs on Location-Based Authentication and Security Services (LBASSs) which allow users to see where their friends are, to search location-tagged content within their local area networks, and to meet others nearby. Previously the data can be accessed from anywhere and any time. Hence lot of unexpected misjudgment were happened due to location independent authentication protocols. The recent availability of open mobile platforms, such as Apple iPhones and any Android phones, makes LBASSs much more accessible to mobile users. After rigorous research funding into this area leads to regulate the access that resources preserved in particular locations. Therefore we improve the development of security from location.

We have been study how users share their location in real world, we collected traces from a commercial LBS services operated by a startup company. In this paper, surveyed all algorithm schemes since two decades and bring out detailed analysis over geo encryption, location authentication, location privacy, enhanced location security, User authentication mobility parameters, tolerant distances under smart living applications. To the best of our knowledge, this study fills the gap between old technologies and new technologies and presents fine tuning quantitative analysis of a real-world LBS services. In this paper authors investigate the various key issues and their methodologies for location authentication in WLAN and mobile devices. This paper leaves several ideas for researchers to mitigate issues in location privacy and authentication areas for better future.


  1. D. Denning, P. MacDoran, Location-Based Authentication: Grounding Cyberspace for Better Security, in: Computer Fraud and Security, np.Elsevier Science Ltd., 1996.
  2. L. Scott, D. Denning, Geo-encryption: Using GPS to Enhance Data Security, GPS World, April 1 2003.
  3. W.B. Hsieh and J.S. Leu, "Design of a time and locationbased One-Time Password authentication scheme." IEEE, 7th International Wireless Communications and Mobile Computing Conference (IWCMC) 2011, pp. 201-206.
  4. Di Qiu “Security From Location” PhD thesis, University of Stanford, USA, 2009
  5. M.D. Firoozjaei and J. Vahidi “Implementing geo-encryption in GSM cellular network” Communications (COMM), 9th International Conference 2012, pp 299-302.
  6. Y. Cho, L. Bao, M. T. Goodrich, "LAAC: A Location-Aware Access Control Protocol", Third Annual International conference on Mobile and Ubiquitous Systems: Networking & Services. pp. 1-7. Jul 2006.
  7. Jason J. Haas, and Yih-Chun Hu. “Secure and Precise Location Verification Using Distance Bounding andSimultaneous Multilateration” Proceedings of the Second ACM Conference on Wireless Network Security (WiSec 2009).
  8. Mahesh Balakrishnan , Iqbal Mohomed , Venugopalan Ramasubramanian, “Where's that phone?: geolocating IPaddresses on 3G networks” Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, November 04-06, 2009,pp 294-300, Chicago, Illinois, USA
  9. S. Laki, P. Matray, P. Haga, I Csabai and G. Vattay “A detailed path-latency model for router geolocation.” InProceedings of the International Conference on Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops (2009).
  10. Feng Zhang “Secure Mobile Service-Oriented Architecture” PhD thesis, KTH Royal Institute of Technology,Sweden, 2012.
  11. IP2LocationTM, [online] 2001, [Accessed: 09 August 2013]. Skyhook wireless, [online] 2004, [Accessed: 09 August 2013].
  12. Hatem Hamad and Souhir Elkourd “Data encryption using the dynamic location and speed of mobile node”, Journal of Media and Communication Studies Vol. 2 (3), pp.067–075, March 2010.
  13. Naveen Sastry, Umesh Shankar, and David Wagner,"Secure verification of location claims", In Proceedings of the ACM Workshop on Wireless Security (WiSe 2003), pages 1–10, September 2003.
  14. S. ˇ Capkun and J. P. Hubaux,"Secure positioning in wireless networks", IEEE Journal on Selected Areas in Communications, 24(2), feb 2006.
  15. E. Gabber and A. Wool. How to prove where you are: Tracking the location of customer equipment. In ACM Conference on Computer and Communications Security, pages 142–149, 1998.
  16. T. Kindberg and K. Zhang. “Context authentication using constrained channels”, In IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 14–21, June 2001.
  17. M. Looi, ” Enhanced authentication services for internet systems using mobile networks”, In IEEE Global Telecommunications Conference, volume 6, pages 3468–3472,February2001.


Data encryption, GPS, location-based Security, Authentication.