Funding InformationEngineering and Physical Reseach Council (EPSRC) PETRAS IoT Hub, EP/N02298X/1. This paper presents the development and implementation of a location-based, lightweight peer-assisted authentication scheme for use in wireless networks. The notion of peer-assisted authentication is based upon some target user equipment-(UE) seeking authentication and access to a network based upon its physical location. The target UE seeks authentication through the UE of peers in the same network. Compared with previous work, the approach in this paper does not rely on any cryptographic proofs from a central authentication infrastructure, thus avoiding complex infrastructure management. However, the peer-assisted authentication consumes network channel resources which will impact on network performance. In this paper, we also present an access control algorithm for balancing the location authentication, network quality of service (QoS), network capacity and time delay. The results demonstrate that peer-assisted authentication considering location authentication and system QoS through dynamic access control strategies can be effectively and efficiently implemented in a number of use cases.
KEYWORDSaccess control, location authentication, quality of service, wireless networks
INTRODUCTIONDriven by the proliferation of Wi-Fi hotspots and femtocells in public places, location-based services (LBSs) have experienced a surge in development in recent years. 1 In LBS systems, users can request a location-dependent service from LBS providers. However, to ensure appropriate use, and assist in the security, of these services, authentication is important. Once mobile users are authenticated, it is possible to grant specific access permissions, such as multimedia-based tourism and nearby marketing.
Related workThere has been increased interest in LBS systems recently. To identify the location of a mobile user, one of the main methods employed is based on the visiting history of user equipments (UEs). By analyzing frequently visited locations of users in the past 6 months, for example, the validation of the current access location can be judged and a digital signature can be provided based on the result. 2 Similarly, in Reference, 3 the BSSID (Wi-Fi MAC address) and RSSI (recovered Wi-Fi signal strength) are recorded while users log into Wi-Fi access points. This location profile is leveraged to generate an authentication questionnaire. The questions concern information about the user's location, such as recently visited places and the order they visited. However, using such a location authentication architecture, a trusted infrastructure is required to achieve a relatively high degree of confidence by using cryptographic protocols. This necessarily increases the complexity of authentication. In this paper, we present a peer-to-peer authentication system which does not require a central infrastructure but is still able to provide efficient authentication.The authentication approach in this paper is based on the trusted locations...