Advanced Location-Driven Authentication Protocols in Mobile Computing Environments

Authors

  • Robina Safi Department of Computer Science, Abasyn University, Pakistan
  • Farhan Nisar Department of Computer Science, Qurtaba University, Pakistan

Keywords:

GPS, Smartphones 4G/5G, Authentication, location-based services, Cybersecurity

Abstract

Mobile devices have evolved into indispensable instruments of contemporary life, fundamentally transforming the manner in which individuals interact with digital services. The proliferation of smartphones has significantly streamlined access to internet-based applications, fostering unprecedented levels of connectivity and convenience. Modern smartphones are equipped with sophisticated technologies, including Location-Based Services (LBS) such as the Global Positioning System (GPS), enabling enhanced contextual awareness and spatial intelligence. While smartphones serve as seamless gateways to digital ecosystems, they simultaneously introduce critical security vulnerabilities, particularly in the domain of authentication. As primary repositories of sensitive and confidential information—Given the pervasive reliance on mobile technologies, ensuring robust authentication mechanisms has become a strategic imperative. Location-based authentication emerges as a promising paradigm that leverages geospatial data to validate user legitimacy. Authentication, being a foundational pillar of cybersecurity architecture, must therefore be reinforced through adaptive and context-aware mechanisms integrated within mobile platforms.

References

D. Jaros and R. Kuchta, “New location-based authentication techniques in the access management,” Proc. - 6th Int. Conf. Wirel. Mob. Commun. ICWMC 2010, pp. 426–430, 2010, doi: 10.1109/ICWMC.2010.62.

Amit Kumar Tyagi, N.sreenath, “Future Challenging Issues in Location based Services,” Int. J. Comput. Appl., vol. 114, no. 5, p. 3, 2015, [Online]. Available: https://www.ijcaonline.org/archives/volume114/number5/19978-1921/

Y. Albayram, M. M. H. Khan, A. Bamis, S. Kentros, N. Nguyen, and R. Jiang, “A location-based authentication system leveraging smartphones,” Proc. - IEEE Int. Conf. Mob. Data Manag., vol. 1, pp. 83–88, Oct. 2014, doi: 10.1109/MDM.2014.16.

W. Bin Hsieh and J. S. Leu, “Design of a time and location based One-Time Password authentication scheme,” IWCMC 2011 - 7th Int. Wirel. Commun. Mob. Comput. Conf., pp. 201–206, 2011, doi: 10.1109/IWCMC.2011.5982418.

Shraddha Ghogare, “Location Based Authentication: A New Approach towards Providing Security,” Int. J. Sci. Res., vol. 2, no. 4, 2012, [Online]. Available: https://www.researchgate.net/publication/290317536_Location_Based_Authentication_A_New_Approach_towards_Providing_Security

F. Zhang, A. Kondoro, and S. Muftic, “Location-based authentication and authorization using smart phones,” Proc. 11th IEEE Int. Conf. Trust. Secur. Priv. Comput. Commun. Trust. - 11th IEEE Int. Conf. Ubiquitous Comput. Commun. IUCC-2012, pp. 1285–1292, 2012, doi: 10.1109/TrustCom.2012.198.

D. Denning and https://independent.academia.edu/DDenning, “Geo-Encryption Using GPS to Enhance Data Security,” Jan. 01, 2003. Accessed: Feb. 22, 2026. [Online]. Available: https://www.academia.edu/127773158/Geo_Encryption_Using_GPS_to_Enhance_Data_Security

Hsien Chou Liao, Yun Hsiang Chao, “A New Data Encryption Algorithm Based on the Location of Mobile Users,” Inf. Technol. J., vol. 7, no. 1, 2008, [Online]. Available: https://www.researchgate.net/publication/26557016_A_New_Data_Encryption_Algorithm_Based_on_the_Location_of_Mobile_Users

V. F. Stefano Rinaldi, “Machine learning-based spreading factor optimization in LoRaWAN networks,” Front. Comput. Sci, vol. 7, 2025, doi: https://doi.org/10.3389/fcomp.2025.1666262.

Arshad Farhad, Muhammad Ali Lodhi, “LSML-SF: a lightweight stacked ML approach for spreading factor allocation in mobile IoT LoRaWAN networks,” Front. Artif. Intell., vol. 9, 2026, doi: https://doi.org/10.3389/frai.2026.1704369.

D. Son, A. Helmy, and B. Krishnamachari, “The effect of mobility-induced location errors on geographic routing in mobile ad hoc and sensor networks: Analysis and improvement using mobility prediction,” IEEE Trans. Mob. Comput., vol. 3, no. 3, pp. 233–245, Jul. 2004, doi: 10.1109/TMC.2004.28.

M. Hussain, “An authentication scheme to protect the location privacy of femtocell users,” Proc. IEEE/ACS Int. Conf. Comput. Syst. Appl. AICCSA, vol. 2014, pp. 652–657, 2014, doi: 10.1109/AICCSA.2014.7073261.

L. Hua and J. Dai, “A location authentication scheme based on adjacent users,” PIC 2014 - Proc. 2014 IEEE Int. Conf. Prog. Informatics Comput., pp. 158–162, Dec. 2014, doi: 10.1109/PIC.2014.6972316.

M. H. Chen and C. H. Chen, “Secondary user authentication based on mobile devices location,” Proc. - 2010 IEEE Int. Conf. Networking, Archit. Storage, NAS 2010, pp. 277–281, 2010, doi: 10.1109/NAS.2010.56.

J. Torres, J. M. Sierra, and A. Izquierdo, “A realistic approach on password-based mutual remote authentication schemes with smart-cards,” Proc. 2007 Inaug. IEEE-IES Digit. Ecosyst. Technol. Conf. DEST 2007, pp. 334–338, 2007, doi: 10.1109/DEST.2007.371994.

H. Jin, L. Tu, G. Yang, and Y. Yang, “An improved mutual authentication scheme in multi-hop WiMax network,” Proc. 2008 Int. Conf. Comput. Electr. Eng. ICCEE 2008, pp. 296–299, 2008, doi: 10.1109/ICCEE.2008.155.

W. Su, S. J. Lee, and M. Gerla, “Mobility prediction in wireless networks,” Proc. - IEEE Mil. Commun. Conf. MILCOM, vol. 1, pp. 491–495, 2000, doi: 10.1109/milcom.2000.905001.

Lei Mu, Geng-Sheng Kuo, and Ningning Tao, “A Novel Location Algorithm Based on Dynamic Compensation Using Linear Location Prediction in NLOS Situations,” pp. 594–598, Sep. 2006, doi: 10.1109/vetecs.2006.1682893.

P. Hoyer, “OTP and Challenge/Response algorithms for financial and e-government identity assurance: current landscape and trends,” ISSE 2008 - Secur. Electron. Bus. Process. Highlights Inf. Secur. Solut. Eur. 2008 Conf., pp. 281–290, 2009, doi: 10.1007/978-3-8348-9283-6_29.

W. Diffie, W. Diffie, and M. E. Hellman, “New Directions in Cryptography,” IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644–654, 1976, doi: 10.1109/TIT.1976.1055638.

F. Nisar, M. Ameen, M. Touseef Irshad, H. Hadi, N. Ahmad, and M. Ladan, “XGBoost-Driven Adaptive Spreading Factor Allocation for Energy-Efficient LoRaWAN Networks,” Front. Commun. Networks, vol. 6, p. 1665262, doi: 10.3389/FRCMN.2025.1665262.

Downloads

Published

2026-02-08

How to Cite

Safi, R., & Nisar, F. (2026). Advanced Location-Driven Authentication Protocols in Mobile Computing Environments. International Journal of Innovations in Science & Technology, 8(1), 320–328. Retrieved from https://www.journal.50sea.com/index.php/IJIST/article/view/1756

Most read articles by the same author(s)