Authenticating a mobile device's location using voice signatures

Jack Brassil, Ravi Netravali, Stuart Haber, Pratyusa Manadhata, Prasad Rao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

Providers of location-based services seek new methods to authenticate the location of their clients. We propose a novel infrastructure-based solution that provides spontaneous and transaction-oriented mobile device location authentication via an integrated 802.11x wireless access point and 3G femtocell access system. By simply making a voice call while remotely monitoring femtocell activity, a calling party can verify a (co-operating) called party's location even when the participants have no pre-existing relationship. We show how such a traffic signature can be reliably detected even in the presence of heavy cross-traffic introduced by other femtocell users. We describe how the verification proceeds without revealing details of the authentication - or even the parties involved - to the location provider.

Original languageEnglish (US)
Title of host publication2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2012
Pages458-465
Number of pages8
DOIs
StatePublished - 2012
Externally publishedYes
Event2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2012 - Barcelona, Spain
Duration: Oct 8 2012Oct 10 2012

Publication series

NameInternational Conference on Wireless and Mobile Computing, Networking and Communications
ISSN (Print)2161-9646
ISSN (Electronic)2161-9654

Conference

Conference2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2012
Country/TerritorySpain
CityBarcelona
Period10/8/1210/10/12

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Keywords

  • E-911
  • GPS
  • detection theory
  • distance bounding
  • location tracking
  • macrocells
  • proximity testing
  • security and privacy

Fingerprint

Dive into the research topics of 'Authenticating a mobile device's location using voice signatures'. Together they form a unique fingerprint.

Cite this