{"title":"LAAC: A Location-Aware Access Control Protocol","authors":"YounSun Cho, L. Bao, M. Goodrich","doi":"10.1109/MOBIQW.2006.361757","DOIUrl":null,"url":null,"abstract":"With the proliferation of wireless communication technologies and mobile computing devices, research interest has grown for location-aware systems and services. We propose LAAC, a novel location-aware access control protocol based on a coarsely defined location area that is enclosed by overlapping areas of multiple access points. Accordingly, a location key for location claim is derived from the overlapping access points' beacon information. In addition, the fact that a mobile device derives the location key enables us to track the location of the mobile device. LAAC does not require additional hardwares such as GPS or ultrasonic devices in order to localize the mobile devices. We enumerate possible attacks to the system and analyze their countermeasures. The computational and communicational costs and the memory requirement are evaluated, and the simulation results are presented","PeriodicalId":440604,"journal":{"name":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"24","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MOBIQW.2006.361757","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 24
Abstract
With the proliferation of wireless communication technologies and mobile computing devices, research interest has grown for location-aware systems and services. We propose LAAC, a novel location-aware access control protocol based on a coarsely defined location area that is enclosed by overlapping areas of multiple access points. Accordingly, a location key for location claim is derived from the overlapping access points' beacon information. In addition, the fact that a mobile device derives the location key enables us to track the location of the mobile device. LAAC does not require additional hardwares such as GPS or ultrasonic devices in order to localize the mobile devices. We enumerate possible attacks to the system and analyze their countermeasures. The computational and communicational costs and the memory requirement are evaluated, and the simulation results are presented