Provided by: International Journal of Scientific and Research Publication (IJSRP)
Date Added: Apr 2012
Identifying communicating entities i.e. \"Users\" is today's need. The process of identifying these entities accurately is known as authentication. The conventional authentication mechanisms are based on three factors: knowledge, possession and biometrics. The geographical position of a user is an important attribute that can be used to authenticate a user. In this paper, the authors are trying to explain how location can be used as one of the credentials to give access to data only to legitimate user. This technique is relatively new approach towards information security.