DocumentCode :
2311863
Title :
Location Authentication Methods for Wireless Network Access Control
Author :
Bao, Lichun
Author_Institution :
Comput. Sci. Dept., Univ. of California, Irvine, CA
fYear :
2008
fDate :
7-9 Dec. 2008
Firstpage :
160
Lastpage :
167
Abstract :
Location-based service provisioning is of great interests to wireless Internet service providers. However, the essential mechanism, location authentication, can easily become the target of network hackers for free-riding and attacks. We identify two aspects for improvements at the network providers to enforce location authentication for network access control location-based key distribution and run-time location verification, and propose solutions to enforce network access control based on location, which we refer to as LENA (Location-Enforced Network Access). First, we designed a location authentication and authorization protocol based on Diffie-Hellman algorithm, which securely authenticates the location claims of mobile wireless devices, and distributes shared keys for data encryption purpose. Secondly, we employ a mobility management protocol to guarantee that the mobile devices are physically at where they claim to be when they access the network. These two steps can separately enforce location based network access control, or be combined. LENA climinates the dependence on expensive hardware devices in order to localize the mobile devices, and solves a couple of possible attacks to the system. The computations, communication, and the memory requirement are evaluated and validated using simulations.
Keywords :
Internet; authorisation; cryptography; message authentication; mobility management (mobile radio); protocols; Diffic-Hellman algorithm; Internet service provider; LENA; data encryption; location authentication method; location-based service provisioning; mobility management protocol; network access control location-based key distribution; wireless network access control; Access control; Access protocols; Algorithm design and analysis; Authentication; Authorization; Computer hacking; Runtime; Web and internet services; Wireless application protocol; Wireless networks; Diffic-Hellman; Location based access control; Personal AP; security management; wireless LAN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Performance, Computing and Communications Conference, 2008. IPCCC 2008. IEEE International
Conference_Location :
Austin, Texas
ISSN :
1097-2641
Print_ISBN :
978-1-4244-3368-1
Electronic_ISBN :
1097-2641
Type :
conf
DOI :
10.1109/PCCC.2008.4745118
Filename :
4745118
Link To Document :
بازگشت