Skip to main content

Access Control Based on Location and Time

  • Conference paper
Signal Processing and Information Technology (SPIT 2011)

Abstract

We propose an access control model that works like three factor authentication for getting access to our system. This system takes time and location into account to specify access control policies. We also discuss implementation techniques for location and time based policy specifications and the integration of these policies in standalone applications. This model enhances current security applications granting access to sensible information and privileges to execute orders only to entities that are in a trusted location with predefined time. Moreover this system authenticate authorized user but also time and location of the authorized user in both way i.e through GSM & GPS. The declarative nature of the model facilitates the analysis of policies and the evaluation of access requests: we present one case-study for clear understanding. This paper shows how computer and network security can be substantially improved through a new form of authentication based on geodetic location parameter received from GPS/ GSM along with the constraint of time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Denning, D.E., MacDoran, P.F.: Location-Based Authentication: Grounding Cyberspace for Better Security. In: Proceedings of the Computer Fraud and Security. Elsevier Science Ltd. (February 1996)

    Google Scholar 

  2. Scott, L., Denning, D.: Location Based Encryption Technique and some of its Applications. In: Proceeding of ION NTM 2003 (2003)

    Google Scholar 

  3. Jarusombat, S., Kittitornkun, S.: Digital Signature on Mobile Devices based on Location. In: International Symposium on Communications and Information Technologies, ISCIT 2006, APOS, pp. 866–870 (2006)

    Google Scholar 

  4. Liao, H.C., Chao, Y.H.: A new data encryption algorithm based on the location of mobile users. Information Technology Journal 7(1) (2008) ISSN 1812-5638

    Google Scholar 

  5. Liao, H.C., Lee, P.C., Chao, Y.H., Chen, C.L.: A Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security. In: The 9th International Conference on Advanced Communication Technology (ICACT 2007), Phoenix Park, Korea, February 12-14, pp. 625–628 (2007)

    Google Scholar 

  6. Zhou, J., Alshamsi, A.: GSM World statistics. GSM Association (2010) (retrieved June 08, 2010)

    Google Scholar 

  7. GSM Technical Data, Cellular.co.za (retrieved August 30, 2010)

    Google Scholar 

  8. Two Billion GSM Customers Worldwide. 3G Americas (June 13, 2006) (retrieved January 08, 2007)

    Google Scholar 

  9. Wang, S., Min, J., Yi, B.K.: Location Based Services for Mobiles: Technologies and Standards. In: IEEE International Conference on Communication (ICC), Beijing, China (2008)

    Google Scholar 

  10. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 614–634 (2001)

    Article  Google Scholar 

  11. Qiu, D.: Security Analysis of Geoencryption: A Case Study Using Loran. In: Proceedings of the 20th International Technical Meeting of the Satellite Division of The Institute of Navigation, ION GNSS (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Limkar, S., Kadam, N., Jha, R.K. (2012). Access Control Based on Location and Time. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32573-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32572-4

  • Online ISBN: 978-3-642-32573-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics