Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1734583.1734586acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

Proving your location without giving up your privacy

Published: 22 February 2010 Publication History

Abstract

Although location-based applications have existed for several years, verifying the correctness of a user's claimed location is a challenge that has only recently gained attention in the research community. Existing architectures for the generation and verification of such location proofs have limited flexibility. For example, they do not support the proactive gathering of location proofs, where, at the time of acquiring a location proof, a user does not yet know for which application or service she will use this proof. Supporting proactive location proofs is challenging because these proofs might enable proof issuers to track a user or they might violate a user's location privacy by revealing more information about a user's location than strictly necessary to an application. We present six essential design goals that a flexible location proof architecture should meet. Furthermore, we introduce a location proof architecture that realizes our design goals and that includes user anonymity and location privacy as key design components, as opposed to previous proposals. Finally, we demonstrate how some of the design goals can be achieved by adopting proper cryptographic techniques.

References

[1]
N. Ahmed and U. Ismail. Designing a high performance wlan testbed for centralized control. In TridentCom 2009: Proc. of 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, pages 1--6, 2009.
[2]
S. Brands and D. Chaum. Distance-bounding protocols. In EUROCRYPT '93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pages 344--359, 1994.
[3]
D. Chaum and E. van Heyst. Group signatures. In EUROCRYPT '91: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pages 257--265, April 1991.
[4]
D. E. Denning and P. F. MacDoran. Location-based authentication: grounding cyberspace for better security. In Internet besieged: countering cyberspace scofflaws, pages 167--174, New York, NY, USA, 1998. ACM Press/Addison-Wesley Publishing Co.
[5]
D. Faria and D. Cheriton. No long term secrets: Location based security in over provisioned wireless lans. In HotNets-III: Proc. of the Third ACM Workshop on Hot Topics in Networks, November 2004.
[6]
V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Location-based trust for mobile user-generated content: applications, challenges and implementations. In HotMobile '08: Proc. of the 9th workshop on Mobile computing systems and applications, pages 60--64, 2008.
[7]
S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In HotMobile '09: Proc. of the 10th workshop on Mobile Computing Systems and Applications, pages 1--6, 2009.
[8]
N. Sastry, U. Shankar, and D. Wagner. Secure verification of location claims. In WiSe '03: Proc. of the 2nd ACM workshop on Wireless security, pages 1--10, 2003.
[9]
B. Waters and E. Felten. Secure, private proofs of location. Technical Report TR-667-03, Department of Computer Science, Princeton University, January 2003.

Cited By

View all
  • (2024)Verifiable Multi-Agent Multi-Task Assignment2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00006(1-12)Online publication date: 7-Oct-2024
  • (2024)PayRide: Secure Transport e-Ticketing with Untrusted Smartphone LocationDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-64171-8_14(261-282)Online publication date: 17-Jul-2024
  • (2021)MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed ConsensusSensors10.3390/s2115509621:15(5096)Online publication date: 28-Jul-2021
  • Show More Cited By
  1. Proving your location without giving up your privacy

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      HotMobile '10: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
      February 2010
      99 pages
      ISBN:9781450300056
      DOI:10.1145/1734583
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 February 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Qualifiers

      • Research-article

      Conference

      HotMobile '10
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 96 of 345 submissions, 28%

      Upcoming Conference

      HOTMOBILE '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)12
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 26 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Verifiable Multi-Agent Multi-Task Assignment2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00006(1-12)Online publication date: 7-Oct-2024
      • (2024)PayRide: Secure Transport e-Ticketing with Untrusted Smartphone LocationDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-64171-8_14(261-282)Online publication date: 17-Jul-2024
      • (2021)MobChain: Three-Way Collusion Resistance in Witness-Oriented Location Proof Systems Using Distributed ConsensusSensors10.3390/s2115509621:15(5096)Online publication date: 28-Jul-2021
      • (2020)Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative AnalysisElectronics10.3390/electronics91117769:11(1776)Online publication date: 26-Oct-2020
      • (2020)QuietPlace: An Ultrasound-Based Proof of Location Protocol with Strong IdentitiesApplied System Innovation10.3390/asi30200193:2(19)Online publication date: 7-Apr-2020
      • (2020)BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location ProofAlgorithms and Architectures for Parallel Processing10.1007/978-3-030-60248-2_35(520-536)Online publication date: 29-Sep-2020
      • (2019)Location corroboration using passive observations of IEEE 802.11 Access Points2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)10.1109/CCNC.2019.8651873(1-7)Online publication date: Jan-2019
      • (2019)Anchor of trust: towards collusion-resistant trusted indoor location for enterprise and industrial usePersonal and Ubiquitous Computing10.1007/s00779-019-01220-5Online publication date: 8-May-2019
      • (2018)Ghost RidersIEEE/ACM Transactions on Networking10.1109/TNET.2018.281807326:3(1123-1136)Online publication date: 1-Jun-2018
      • (2018)A User Authentication Scheme Using Real-Time Location, QR-Code, and One Time Password: A Preliminary Work2018 International Conference on Electrical Engineering and Informatics (ICELTICs)(44501)10.1109/ICELTICS.2018.8548786(67-71)Online publication date: Sep-2018
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media