2014
DOI: 10.1007/978-3-662-43936-4_10
|View full text |Cite
|
Sign up to set email alerts
|

‘Who, When, and Where?’ Location Proof Assertion for Mobile Devices

Abstract: In recent years, location of mobile devices has become an important factor. Mobile device users can easily access various customized applications from the service providers based on the current physical location information. Nonetheless, it is a significant challenge in distributed architectures for users to prove their presence at a particular location in a privacy-protected and secured manner. So far, researchers have proposed multiple schemes to implement a secure location proof collection mechanism. Howeve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
20
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(20 citation statements)
references
References 24 publications
0
20
0
Order By: Relevance
“…The same authors extended the work in [41] to propose the WORAL [22], a distributed witness-oriented secure location provenance framework for mobile devices. WORAL is a complete working system built by integrating the asserted location proof (ALP) of [18] and the OTIT [45] model for managing secure provenance. In WORAL, collusion models and corresponding threats are well discussed, and it is claimed that the system is only 12.5% vulnerable due to 3-way collusion.…”
Section: Comparative Analysis Of Location Proof Systemsmentioning
confidence: 99%
See 3 more Smart Citations
“…The same authors extended the work in [41] to propose the WORAL [22], a distributed witness-oriented secure location provenance framework for mobile devices. WORAL is a complete working system built by integrating the asserted location proof (ALP) of [18] and the OTIT [45] model for managing secure provenance. In WORAL, collusion models and corresponding threats are well discussed, and it is claimed that the system is only 12.5% vulnerable due to 3-way collusion.…”
Section: Comparative Analysis Of Location Proof Systemsmentioning
confidence: 99%
“…Localization is a mechanism by which smart devices can report their location by computing their position relative to a cellular tower, satellite or other co-located devices. In location proof systems, localization is conducted utilizing physical hardware devices (including infrared [14], Wi-Fi infrastructure [15], Bluetooth [16] and GPS [17]) and algorithms (for example cellular tower triangulation, mobile device triangulation [18], audio-based positioning [14], IP address tracking [18], distance bounding protocols [19] and proximity [13,20]) in a secure manner. From a design perspective, centralized architectures were used initially to provide the basis for location proof systems.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…QR code forgery a ack has been reported in our previous work [23]. In order to provide veri cations for users' location claims, location proof mechanisms have been proposed [7,20]. However, these methods require either additional infrastructures or lots of users which will complicate the design of a mobile crowdsensing system.…”
Section: Related Workmentioning
confidence: 99%