CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN’s and Mobile Devices

by P. Sanyasi Naidu, Jagadish Gurrala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 146 - Number 8
Year of Publication: 2016
Authors: P. Sanyasi Naidu, Jagadish Gurrala
10.5120/ijca2016910829

P. Sanyasi Naidu, Jagadish Gurrala . Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN’s and Mobile Devices. International Journal of Computer Applications. 146, 8 ( Jul 2016), 12-17. DOI=10.5120/ijca2016910829

@article{ 10.5120/ijca2016910829,
author = { P. Sanyasi Naidu, Jagadish Gurrala },
title = { Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN’s and Mobile Devices },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2016 },
volume = { 146 },
number = { 8 },
month = { Jul },
year = { 2016 },
issn = { 0975-8887 },
pages = { 12-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume146/number8/25417-2016910829/ },
doi = { 10.5120/ijca2016910829 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:49:51.910484+05:30
%A P. Sanyasi Naidu
%A Jagadish Gurrala
%T Investigation and Analysis of Location based Authentication and Security Services of Wireless LAN’s and Mobile Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 146
%N 8
%P 12-17
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the last two decades lot of research and development occurs on Location-Based Authentication and Security Services (LBASSs) which allow users to see where their friends are, to search location-tagged content within their local area networks, and to meet others nearby. Previously the data can be accessed from anywhere and any time. Hence lot of unexpected misjudgment were happened due to location independent authentication protocols. The recent availability of open mobile platforms, such as Apple iPhones and any Android phones, makes LBASSs much more accessible to mobile users. After rigorous research funding into this area leads to regulate the access that resources preserved in particular locations. Therefore we improve the development of security from location. We have been study how users share their location in real world, we collected traces from a commercial LBS services operated by a startup company. In this paper, surveyed all algorithm schemes since two decades and bring out detailed analysis over geo encryption, location authentication, location privacy, enhanced location security, User authentication mobility parameters, tolerant distances under smart living applications. To the best of our knowledge, this study fills the gap between old technologies and new technologies and presents fine tuning quantitative analysis of a real-world LBS services. In this paper authors investigate the various key issues and their methodologies for location authentication in WLAN and mobile devices. This paper leaves several ideas for researchers to mitigate issues in location privacy and authentication areas for better future.

References
  1. D. Denning, P. MacDoran, Location-Based Authentication: Grounding Cyberspace for Better Security, in: Computer Fraud and Security, np.Elsevier Science Ltd., 1996.
  2. L. Scott, D. Denning, Geo-encryption: Using GPS to Enhance Data Security, GPS World, April 1 2003.
  3. W.B. Hsieh and J.S. Leu, "Design of a time and locationbased One-Time Password authentication scheme." IEEE, 7th International Wireless Communications and Mobile Computing Conference (IWCMC) 2011, pp. 201-206.
  4. Di Qiu “Security From Location” PhD thesis, University of Stanford, USA, 2009
  5. M.D. Firoozjaei and J. Vahidi “Implementing geo-encryption in GSM cellular network” Communications (COMM), 9th International Conference 2012, pp 299-302.
  6. Y. Cho, L. Bao, M. T. Goodrich, "LAAC: A Location-Aware Access Control Protocol", Third Annual International conference on Mobile and Ubiquitous Systems: Networking & Services. pp. 1-7. Jul 2006.
  7. Jason J. Haas, and Yih-Chun Hu. “Secure and Precise Location Verification Using Distance Bounding andSimultaneous Multilateration” Proceedings of the Second ACM Conference on Wireless Network Security (WiSec 2009).
  8. Mahesh Balakrishnan , Iqbal Mohomed , Venugopalan Ramasubramanian, “Where's that phone?: geolocating IPaddresses on 3G networks” Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, November 04-06, 2009,pp 294-300, Chicago, Illinois, USA
  9. S. Laki, P. Matray, P. Haga, I Csabai and G. Vattay “A detailed path-latency model for router geolocation.” InProceedings of the International Conference on Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops (2009).
  10. Feng Zhang “Secure Mobile Service-Oriented Architecture” PhD thesis, KTH Royal Institute of Technology,Sweden, 2012.
  11. IP2LocationTM, [online] 2001, http://www.ip2location.com/ [Accessed: 09 August 2013]. Skyhook wireless, [online] 2004, http://www.skyhookwireless.com/ [Accessed: 09 August 2013].
  12. Hatem Hamad and Souhir Elkourd “Data encryption using the dynamic location and speed of mobile node”, Journal of Media and Communication Studies Vol. 2 (3), pp.067–075, March 2010.
  13. Naveen Sastry, Umesh Shankar, and David Wagner,"Secure verification of location claims", In Proceedings of the ACM Workshop on Wireless Security (WiSe 2003), pages 1–10, September 2003.
  14. S. ˇ Capkun and J. P. Hubaux,"Secure positioning in wireless networks", IEEE Journal on Selected Areas in Communications, 24(2), feb 2006.
  15. E. Gabber and A. Wool. How to prove where you are: Tracking the location of customer equipment. In ACM Conference on Computer and Communications Security, pages 142–149, 1998.
  16. T. Kindberg and K. Zhang. “Context authentication using constrained channels”, In IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pages 14–21, June 2001.
  17. M. Looi, ” Enhanced authentication services for internet systems using mobile networks”, In IEEE Global Telecommunications Conference, volume 6, pages 3468–3472,February2001.
Index Terms

Computer Science
Information Sciences

Keywords

Data encryption GPS location-based Security Authentication.