Location-Based Security for Resource Management


  • Iulia Grumaz IT&C Security Master Department of Economic Informatics and Cybernetics The Bucharest University of Economic Studies


Location, Mobile, Access Control, Partial Keys, Distributed System, Bluetooth, Android


Considering that wireless technology has widespread and mobile devices gain every day even more popularity, security concerns are increasingly shifting to these areas and solutions that take into account the high mobility users have been empowered with, are in demand. Hence, the aim of this paper is to propose a model for securing and controlling access of mobile clients to resources by using reliable location information, which is available by the means of access points already existing in network infrastructure of most organizations. The key part of the architecture, obtaining a reliable location proof and checking its authenticity, is based on a scheme derived from a validated cryptographic protocol, the Diffie-Hellman key-exchange. The software implementation demonstrates how current technology stack (Java, Android and Bluetooth etc.) can be used to create a workable system and a series of conclusions is drawn at the end to highlight the model’s advantages, limitations and possible improvements.


"Internet Security Glossary, Version 2,", available online, http://tools.ietf.org/html/rfc4949, accessed on March 20, 2015.

C. A. Ardagna, M. Cremonini, E. Damiani, S. d. C. Vimercati and P. Samarati, "Supporting Location-Based Conditions in Access Control Policies," Proceedings of the 2006 ACM Symposium on Information, computer, p. 222, 2006.

J. Koppers, "Location Based services: Positioning techniques,", available online, http://www.positioningtechniques.eu/lbs_technique_checker.asp, accessed on April 2, 2015.

The University of Texas at Austin, "Todd Humphreys' Research Team Demonstrates First Successful GPS Spoofing of UAV,", available online, http://www.ae.utexas.edu/news/features/todd-humphreys-research-team-demonstrates-first-successful-gps-spoofing-of-uav, accessed on May 5, 2015.

A. v. Cleeff, W. Pieters and R. Wieringa, "Benefits of Location-Based Access Control: A Literature Study," GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing, 2010, pp. 739-746.

C. Boja, "Location Based Encryption with Distributed Shared Keys in Mobile Services," Proceedings of Information Technology and Communications Security Conference, 2011, pp. 67-74.

Y. Sun Cho and L. Bao, "Secure Access Control for Location-Based Applications in WLAN Systems," Mobile Adhoc and Sensor Systems (MASS), 2006 IEEE International Conference, 2006, pp. 852-857.

C. Ibsen and J. Anstey, "Appendix E: Akka and Camel," in Camel in Action, Manning Publications, 2011, pp. 487-492.

E. C. Ortiz, "Using the Java APIs for Bluetooth Wireless Technology, Part 1 - API Overview,", available online, http://www.oracle.com/technetwork/articles/javame/index-156193.html, accessed on April 10, 2015.

"Android Bluetooth,", available online, http://developer.android.com/guide/topics/connectivity/bluetooth.html, accessed on March 10, 2015.

"SSL on Android: The Basics,", available online, https://commonsware.com/blog/2013/03/04/ssl-android-basics.html, accessed on February 20, 2015.

J. R. Douceur, "The Sybil Attack," 2002., available online, http://research.microsoft.com/pubs/74220/IPTPS2002.pdf, accessed on March 14, 2015.




How to Cite

Grumaz, I. (2015). Location-Based Security for Resource Management. Journal of Mobile, Embedded and Distributed Systems, 7(3), 121-129. Retrieved from http://www.jmeds.eu/index.php/jmeds/article/view/Location-Based_Security_for_Resource_Management