Loading…
Location Authentication Methods for Wireless Network Access Control
Location-based service provisioning is of great interests to wireless Internet service providers. However, the essential mechanism, location authentication, can easily become the target of network hackers for free-riding and attacks. We identify two aspects for improvements at the network providers...
Saved in:
Main Author: | |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Location-based service provisioning is of great interests to wireless Internet service providers. However, the essential mechanism, location authentication, can easily become the target of network hackers for free-riding and attacks. We identify two aspects for improvements at the network providers to enforce location authentication for network access control location-based key distribution and run-time location verification, and propose solutions to enforce network access control based on location, which we refer to as LENA (Location-Enforced Network Access). First, we designed a location authentication and authorization protocol based on Diffie-Hellman algorithm, which securely authenticates the location claims of mobile wireless devices, and distributes shared keys for data encryption purpose. Secondly, we employ a mobility management protocol to guarantee that the mobile devices are physically at where they claim to be when they access the network. These two steps can separately enforce location based network access control, or be combined. LENA climinates the dependence on expensive hardware devices in order to localize the mobile devices, and solves a couple of possible attacks to the system. The computations, communication, and the memory requirement are evaluated and validated using simulations. |
---|---|
ISSN: | 1097-2641 2374-9628 |
DOI: | 10.1109/PCCC.2008.4745118 |