Mobile Client’s Access Mechanism for Location based Service using Cell-ID
نویسندگان
چکیده
Today’s location-sensitive service relies on user’s mobile device to determine its location and send the location to the application. A location-based service is a service that determines the location of a mobile device and uses this to provide functionalities and information specific to that location. With the growth of the importance and of the audience of location-based services, questions of security and privacy are brought forward. As services are being built on top of this technology, the number of parties increases significantly, and the possibility of a malicious insider (or a misbehaving insider) emerges. The extent to which the parties care to trust each other has reduced, and trust amongst the various parties can no longer be assumed by a location-based service. An attacker may try to steal a service (e.g., claiming to be a client to get free internet access), service providers may gain of private information. There should be a proper authentication mechanism between client and server to access the services. By considering some important factors like Cost, Energy Efficiency, we have proposed an Access Mechanism in which mobile Phone Users will send request for some services from server. Firstly Location Verification is done; server verifies the User’s Mobile Phone’s location against authorized location. After User/Device Authentication is done, server checks User/Device Identification. If both conditions are true, server will grant access to the users for services and resources.
منابع مشابه
Secure and Stateless RESTful Web Service Using ID-Based Encryption
REST protocol has gained great popularity as a communication in the various areas such as web service and IoT devices. However, the current RESTful web service has shortcomings in the authentication process. We developed an ID-based authentication algorithm to achieve a secure and stateless RESTful web service. ID-based authentication process allows a server to handle the client’s request by ac...
متن کاملMovement-aware and QoS-driven indoor location and mobile service discovery framework
The ever evolving wireless technology and the advances in mobile devices induced a growing interest in indoor location-based services (ILBS). In this paper, we propose an ILBS discovery framework that finds the accurate indoor location of mobile users and provides information about services within the users’ surrounding area keeping in mind the client’s Quality of Service (QoS). It also provide...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملDesign and evaluation of two scalable protocols for location management of mobile nodes in location based routing protocols in mobile Ad Hoc Networks
Heretofore several position-based routing protocols have been developed for mobile ad hoc networks. Many of these protocols assume that a location service is available which provides location information on the nodes in the network.Our solutions decrease location update without loss of query success rate or throughput and even increase those.Simulation results show that our methods are effectiv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012