Abstract
Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model and the related security can be further enhanced. We propose a hierarchical location and proximity based access framework to services using mobile devices. We then show that it is practically feasible to implement this framework using 'intelligent' mobile agents. We discuss the necessary security mechanisms and security protocols for such a framework and show that our framework is resilient to relay attacks. The developed location aware mobile agent is equipped with accurate source-of-location sensing that operates online and offline. © 2010 ACM.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2010, Co-located with ACM/IFIP/USENIX International Middleware Conference |
| DOIs | |
| Publication status | Published - 2010 |
| Externally published | Yes |
| Event | 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2010, Co-located with ACM/IFIP/USENIX International Middleware Conference - Bangalore, India Duration: 29 Nov 2010 → 29 Nov 2010 |
Conference
| Conference | 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing, M-MPAC 2010, Co-located with ACM/IFIP/USENIX International Middleware Conference |
|---|---|
| Place | India |
| City | Bangalore |
| Period | 29/11/10 → 29/11/10 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 9 Industry, Innovation, and Infrastructure
Research Keywords
- Experimentation
- I.2.11 [Distributed Artificial Intelligence]: Intelligent agents
- K.6 [Management of Computing and Information Systems]
- K.6.5 [Security and Protection]: Authentication
- K.6.m [Miscellaneous]: Security
- Security
Fingerprint
Dive into the research topics of 'A location based security framework for authenticating mobile phones'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver