Server Assemble Location Authentication in Internet using Positioning Algorithm

Authors(2) :-A. Alekhya, Dr. K. S. Yuvaraj

Server Assemble Location Authentication mechanism to providing real time server location verification. Its uses and enhancing server authentication is browsers to automatically interpret server location data. Server Location Verification (SLV) is find Planet Lab to explain to SLV is compatible with the increasing trends of geographically distributed content dissemination over the internet without causing any interoperability conflicts. New notion of server location pinning within TLS to support SLV to evaluate their combined impact using a server authentication options framework. The propose system novel Wi-Fi indoor positioning and tracking framework which employs the spatial analysis and image processing methods. To specifically leverage Channel ID-based authentication in combination with server invariance to create a novel mechanism that we call SISCA Server Invariance with Strong Client Authentication. With the uses of signing and symmetric modules to secure verification process put forth. Sign module is responsible for signature generation of input data along with UMAC and unique signing key. Security design and implement is efficient cryptographic protocol that security keystroke integrity by utilizing chip Trusted Computing Platform (TPM). The protocol prevents the forgery of fake key events by malware under reasonable assumptions. The verification method is lightweight framework for restricting outbound malware traffic in Nearest Neighbor (NN) algorithm of the fingerprinting method to identify the initial position estimate of the smart phone user.

Authors and Affiliations

A. Alekhya

Dr. K. S. Yuvaraj

Indoor Positioning, Wi-Fi, Smartphone, LBS, Fingerprinting, Geographic Information Systems; Global Positioning Systems

  1. A. M. Abdou, A. Matrawy, and P. C. van Oorschot, “Location Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients,” in IEEE CNS, Oct. 2014
  2. ADKINS, H. An update on attempted man-in-the-middle attacks.
  3. AUBOURG, J., SONG, J., STEEN, H. R. M., AND VAN KESTEREN, A. XMLHttpRequest (W3C Working Draft).
  4. A. Baliga, P. Kamat, and L. Iftode. Lurking in the shadows: Identifying systemic threats to kernel data. In IEEE Symposium on Security and Privacy, pages 246–251. IEEE Computer Society, 2007.
  5. B. Blackburn and R. Ranger. Barbara Blackburn, the World’s Fastest Typist, 1999.
  6. M. Christodorescu, S. Jha, and C. Kruegel. Mining specifications of malicious behavior. In ESEC-FSE ’07: Proceedings of the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, pages 5–14, New York, NY, USA, 2007. ACM
  7. A. Bose and C. H. Foh. A practical path loss model for indoor wifi positioning enhancement. In Information, Communications & Signal Processing, 2007 6th International Conference on, pages 1–5. IEEE, 2007
  8. M. Brunato and R. Battiti. Statistical learning theory for location fingerprinting in wireless lans. Computer Networks, 47(6):825–845, 2005.
  9. N. Bulusu, J. Heidemann, and D. Estrin. Gps-less low-cost outdoor localization for very small devices. IEEE personal communications, 7(5):28–34, 2000.
  10. R. Dhamija, J. D. Tygar, and M. Hearst, “Why phishing works,” in ACM CHI, 2006, pp. 581–590
  11. N. Vratonjic, J. Freudiger, V. Bindschaedler, and J.-P. Hubaux, “The inconvenient truth about web certificates,” in Economics of info sec and priv III. Springer, 2013, pp. 79–117.
  12. J. A. Muir and P. C. van Oorschot, “Internet geolocation: Evasion and counterevasion,” ACM Comput. Surv., vol. 42, pp. 4:1–4:23, 2009.
  13. T. H.-J. Kim, V. Gligor, and A. Perrig, “GeoPKI: Converting Spatial Trust into Certificate Trust,” in Springer EuroPKI, 2013, pp. 128–144
  14. Anirudha Vikhe, P. S. Desai, “Data Provenance Verification for Secure Host Using Advanced Cryptographic Algorithm”, INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS, VOL 88-NO.11, FEB. 2014
  15. Huijun Xiong, Chehai Wu, Deian Stefan, Danfeng Yao Member, Data-Provenance Verification For Secure Hosts , IEEE Transactions On Dependable and secure computing vol.9 no.2 year 2012.
  16. M. J. De Smith, M. F. Goodchild, and P. Longley. Geospatial analysis: a comprehensive guide to principles, techniques and software tools. Troubador Publishing Ltd, 2007.
  17. F. Evennou and F. Marx. Advanced integration of wifi and inertial navigation systems for indoor mobile positioning. Eurasip journal on applied signal processing, 2006:164–164, 2006.
  18. R. Faragher and R. Harle. An analysis of the accuracy of bluetooth low energy for indoor positioning
  19. A. Cayley. On a theorem in the geometry of position. Cambridge Mathematical Journal, 2:267–271, 1841.
  20. N. Chang, R. Rashidzadeh, and M. Ahmadi. Robust indoor positioning using differential wi-fi access points. IEEE Transactions on Consumer Electronics, 56(3):1860–1867, 2010.
  21. B.Baliga, P. Kamat, and L. Iftode. Lurking in the shadows: Identifying systemic threats to kernel data. In IEEE Symposium on Security and Privacy, pages 246–251. IEEE Computer Society, 2007.
  22. W. Cui, R. H. Katz, and W. Tian Tan. Design and implementation of an extrusion-based break-in detector for personal computers. In ACSAC, pages 361–370. IEEE Computer Society, 2005.
  23. A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In CCS ’08: Proceedings of the 15th ACM conference on Computer and communications security, pages 51–62, New York, NY, USA, 2008. ACM.
  24. S. Garriss, R. Caceres, S. Berger, R. Sailer, L. van Doorn, and ´ X. Zhang. Trustworthy and personalized computing on public kiosks. In MobiSys ’08: Proceeding of the 6th international conference on Mobile systems, applications, and services, pages 199–210, New York, NY, USA, 2008. ACM.
  25. J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by IRC nickname evaluation. In Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, April 2007
  26. H. Xiong, P. Malhotra, D. Stefan, C. Wu, and D. Yao. Userassisted host-based detection of outbound malware traffic. In Proceedings of International Conference on Information and Communications Security (ICICS), December 2009.
  27. G. Xu, C. Borcea, and L. Iftode. Satem: Trusted service code execution across transactions. In Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS), pages 321–336, Washington, DC, USA, 2006. IEEE Computer Society
  28. J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS. The Internet Society, 2009.
  29. M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My botnet is bigger than yours (maybe, better than yours). In Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets, April2007

Publication Details

Published in : Volume 4 | Issue 7 | March-April 2018
Date of Publication : 2018-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 47-53
Manuscript Number : IJSRST1845195
Publisher : Technoscience Academy

Print ISSN : 2395-6011, Online ISSN : 2395-602X

Cite This Article :

A. Alekhya, Dr. K. S. Yuvaraj, " Server Assemble Location Authentication in Internet using Positioning Algorithm", International Journal of Scientific Research in Science and Technology(IJSRST), Print ISSN : 2395-6011, Online ISSN : 2395-602X, Volume 4, Issue 7, pp.47-53, March-April-2018.
Journal URL :

Article Preview

Contact Us