Advanced Location-Driven Authentication Protocols in Mobile Computing Environments
Keywords:
GPS, Smartphones 4G/5G, Authentication, location-based services, CybersecurityAbstract
Mobile devices have evolved into indispensable instruments of contemporary life, fundamentally transforming the manner in which individuals interact with digital services. The proliferation of smartphones has significantly streamlined access to internet-based applications, fostering unprecedented levels of connectivity and convenience. Modern smartphones are equipped with sophisticated technologies, including Location-Based Services (LBS) such as the Global Positioning System (GPS), enabling enhanced contextual awareness and spatial intelligence. While smartphones serve as seamless gateways to digital ecosystems, they simultaneously introduce critical security vulnerabilities, particularly in the domain of authentication. As primary repositories of sensitive and confidential information—Given the pervasive reliance on mobile technologies, ensuring robust authentication mechanisms has become a strategic imperative. Location-based authentication emerges as a promising paradigm that leverages geospatial data to validate user legitimacy. Authentication, being a foundational pillar of cybersecurity architecture, must therefore be reinforced through adaptive and context-aware mechanisms integrated within mobile platforms.
References
D. Jaros and R. Kuchta, “New location-based authentication techniques in the access management,” Proc. - 6th Int. Conf. Wirel. Mob. Commun. ICWMC 2010, pp. 426–430, 2010, doi: 10.1109/ICWMC.2010.62.
Amit Kumar Tyagi, N.sreenath, “Future Challenging Issues in Location based Services,” Int. J. Comput. Appl., vol. 114, no. 5, p. 3, 2015, [Online]. Available: https://www.ijcaonline.org/archives/volume114/number5/19978-1921/
Y. Albayram, M. M. H. Khan, A. Bamis, S. Kentros, N. Nguyen, and R. Jiang, “A location-based authentication system leveraging smartphones,” Proc. - IEEE Int. Conf. Mob. Data Manag., vol. 1, pp. 83–88, Oct. 2014, doi: 10.1109/MDM.2014.16.
W. Bin Hsieh and J. S. Leu, “Design of a time and location based One-Time Password authentication scheme,” IWCMC 2011 - 7th Int. Wirel. Commun. Mob. Comput. Conf., pp. 201–206, 2011, doi: 10.1109/IWCMC.2011.5982418.
Shraddha Ghogare, “Location Based Authentication: A New Approach towards Providing Security,” Int. J. Sci. Res., vol. 2, no. 4, 2012, [Online]. Available: https://www.researchgate.net/publication/290317536_Location_Based_Authentication_A_New_Approach_towards_Providing_Security
F. Zhang, A. Kondoro, and S. Muftic, “Location-based authentication and authorization using smart phones,” Proc. 11th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. - 11th IEEE Int. Conf. Ubiquitous Comput. Commun. IUCC-2012, pp. 1285–1292, 2012, doi: 10.1109/TrustCom.2012.198.
D. Denning and https://independent.academia.edu/DDenning, “Geo-Encryption Using GPS to Enhance Data Security,” Jan. 01, 2003. Accessed: Feb. 22, 2026. [Online]. Available: https://www.academia.edu/127773158/Geo_Encryption_Using_GPS_to_Enhance_Data_Security
Hsien Chou Liao, Yun Hsiang Chao, “A New Data Encryption Algorithm Based on the Location of Mobile Users,” Inf. Technol. J., vol. 7, no. 1, 2008, [Online]. Available: https://www.researchgate.net/publication/26557016_A_New_Data_Encryption_Algorithm_Based_on_the_Location_of_Mobile_Users
V. F. Stefano Rinaldi, “Machine learning-based spreading factor optimization in LoRaWAN networks,” Front. Comput. Sci, vol. 7, 2025, doi: https://doi.org/10.3389/fcomp.2025.1666262.
Arshad Farhad, Muhammad Ali Lodhi, “LSML-SF: a lightweight stacked ML approach for spreading factor allocation in mobile IoT LoRaWAN networks,” Front. Artif. Intell., vol. 9, 2026, doi: https://doi.org/10.3389/frai.2026.1704369.
D. Son, A. Helmy, and B. Krishnamachari, “The effect of mobility-induced location errors on geographic routing in mobile ad hoc and sensor networks: Analysis and improvement using mobility prediction,” IEEE Trans. Mob. Comput., vol. 3, no. 3, pp. 233–245, Jul. 2004, doi: 10.1109/TMC.2004.28.
M. Hussain, “An authentication scheme to protect the location privacy of femtocell users,” Proc. IEEE/ACS Int. Conf. Comput. Syst. Appl. AICCSA, vol. 2014, pp. 652–657, 2014, doi: 10.1109/AICCSA.2014.7073261.
L. Hua and J. Dai, “A location authentication scheme based on adjacent users,” PIC 2014 - Proc. 2014 IEEE Int. Conf. Prog. Informatics Comput., pp. 158–162, Dec. 2014, doi: 10.1109/PIC.2014.6972316.
M. H. Chen and C. H. Chen, “Secondary user authentication based on mobile devices location,” Proc. - 2010 IEEE Int. Conf. Networking, Archit. Storage, NAS 2010, pp. 277–281, 2010, doi: 10.1109/NAS.2010.56.
J. Torres, J. M. Sierra, and A. Izquierdo, “A realistic approach on password-based mutual remote authentication schemes with smart-cards,” Proc. 2007 Inaug. IEEE-IES Digit. Ecosyst. Technol. Conf. DEST 2007, pp. 334–338, 2007, doi: 10.1109/DEST.2007.371994.
H. Jin, L. Tu, G. Yang, and Y. Yang, “An improved mutual authentication scheme in multi-hop WiMax network,” Proc. 2008 Int. Conf. Comput. Electr. Eng. ICCEE 2008, pp. 296–299, 2008, doi: 10.1109/ICCEE.2008.155.
W. Su, S. J. Lee, and M. Gerla, “Mobility prediction in wireless networks,” Proc. - IEEE Mil. Commun. Conf. MILCOM, vol. 1, pp. 491–495, 2000, doi: 10.1109/milcom.2000.905001.
Lei Mu, Geng-Sheng Kuo, and Ningning Tao, “A Novel Location Algorithm Based on Dynamic Compensation Using Linear Location Prediction in NLOS Situations,” pp. 594–598, Sep. 2006, doi: 10.1109/vetecs.2006.1682893.
P. Hoyer, “OTP and Challenge/Response algorithms for financial and e-government identity assurance: current landscape and trends,” ISSE 2008 - Secur. Electron. Bus. Process. Highlights Inf. Secur. Solut. Eur. 2008 Conf., pp. 281–290, 2009, doi: 10.1007/978-3-8348-9283-6_29.
W. Diffie, W. Diffie, and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976, doi: 10.1109/TIT.1976.1055638.
F. Nisar, M. Ameen, M. Touseef Irshad, H. Hadi, N. Ahmad, and M. Ladan, “XGBoost-Driven Adaptive Spreading Factor Allocation for Energy-Efficient LoRaWAN Networks,” Front. Commun. Networks, vol. 6, p. 1665262, doi: 10.3389/FRCMN.2025.1665262.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 50sea

This work is licensed under a Creative Commons Attribution 4.0 International License.


















