2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems 2015
DOI: 10.1109/mass.2015.33
|View full text |Cite
|
Sign up to set email alerts
|

CLIP: Continuous Location Integrity and Provenance for Mobile Phones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…In QuietPlace we used the third technique, hash chains, to include all possible location granularity levels in the proof without redundant information. There are many different variations of hash chains used in proof of location protocols [1,2,4,16] all of which are compatible with our protocol. We used a simple hash chain as described in [24].…”
Section: Location Granularity Levelsmentioning
confidence: 99%
See 2 more Smart Citations
“…In QuietPlace we used the third technique, hash chains, to include all possible location granularity levels in the proof without redundant information. There are many different variations of hash chains used in proof of location protocols [1,2,4,16] all of which are compatible with our protocol. We used a simple hash chain as described in [24].…”
Section: Location Granularity Levelsmentioning
confidence: 99%
“…When there is a benefit from being at a specific location, the incentive to cheat the location-based service is created. In [1,2] authors mention Trusted Platform Module, a tamper-resistant hardware component that makes spoofing the reported location impossible. However, this is not currently available in commercial devices and has additional cost.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…It requires low cost of computational and storage resources while implements on iOS platform. We also preferred [7] [8] [9] [10] papers for the reference and getting good conclusion.…”
Section: In Davis Et Al's [4]mentioning
confidence: 99%
“…Amidst numerous literature, there is discussion on the fairly narrow topic of Proof-of-Location (PoL) [6][7][8] as a technology specifically useful at network edge, as it makes it possible for the various location-aware services to connect users to verifiable locations, while at the same time allowing users to retain their privacy. Note that PoL is not an alternative to Proof-of-Work (PoW) or Proof-of-Stake (PoS)-the two low-level approaches to attaining consensus in distributed multiparty transactions.…”
Section: Introductionmentioning
confidence: 99%