Skip to main content

A Robust Spatio-Temporal Verification Protocol for Blockchain

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11233))

Abstract

Massive Spatio-temporal data is increasingly collected in a variety of domains including supply chain. The authenticity as well as the security of such data is usually a concern due to the requirement of trust in centralised systems. Blockchain technology has come to the forth recently and offers ways for trustless and reliable storage and processing of data. However, current blockchain proposals either do not support spatial data or make simplifying assumptions such as ‘trusted’ servers to process spatio-temporal data. We presume that the notion of ‘trust’ in a blockchain is too strong an assumption and propose a robust spatio-temporal verification protocol for the blockchain. In this work, we present a novel practical proof-of-location protocol on top of a permissioned blockchain. The protocol is instrumented by the implementation of an access control model and utilises a set of verification rules to create and verify spatio-temporal data points. We also propose a threat-to-validity model to evaluate the robustness of the verification protocol. The applicability and practicality of the protocol is demonstrated by the implementation of a supply chain case study as a proof-of-concept.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Online at http://sikorka.io.

  2. 2.

    Online at https://foam.space.

  3. 3.

    Online at https://xyo.network/whitepaper.

  4. 4.

    We do not consider user privacy issues in this study and consider it as a future work.

  5. 5.

    We assume that an adversary can not violate cryptographic assumptions.

  6. 6.

    https://github.com/grimadas/iroha-supply-chain.

  7. 7.

    https://github.com/hyperledger/iroha.

References

  1. Abdou, A.M., et al.: Location verification on the internet: towards enforcing location-aware access policies over internet clients. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 175–183 (2014)

    Google Scholar 

  2. Ahi, P., Searcy, C.: Assessing sustainability in the supply chain: a triple bottom line approach. Appl. Math. Model. 39(10–11), 2882–2896 (2015)

    Article  MathSciNet  Google Scholar 

  3. Brambilla, G., Amoretti, M., Zanichelli, F.: Using block chain for peer-to-peer proof-of-location. arXiv preprint arXiv:1607.00174 (2016)

  4. Castro, M., Liskov, B., et al.: Practical byzantine fault tolerance. In: OSDI, vol. 99, pp. 173–186 (1999)

    Google Scholar 

  5. Fischer, M.J., Lynch, N.A., Paterson, M.S.: Impossibility of distributed consensus with one faulty process. J. ACM (JACM) 32(2), 374–382 (1985)

    Article  MathSciNet  Google Scholar 

  6. Gambs, S., Killijian, M.O., Roy, M., Traoré, M.: PROPS: a PRivacy-preserving location proof system. In: IEEE 33rd International Symposium on SRDS, pp. 1–10 (2014)

    Google Scholar 

  7. Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., Lachapelle, G.: GPS vulnerability to spoofing threats and a review of antispoofing techniques. Int. J. Navig. Obs. (2012)

    Google Scholar 

  8. Javali, C., Revadigar, G., Rasmussen, K.B., Hu, W., Jha, S.: I am Alice, i was in wonderland: secure location proof generation and verification protocol. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp. 477–485 (2016)

    Google Scholar 

  9. Muzammal, M., Gohar, M., Rahman, A.U., Qu, Q., et al.: Trajectory mining using uncertain sensor data. IEEE Access 6, 4895–4903 (2018)

    Article  Google Scholar 

  10. Muzammal, M.: Renovating blockchain with distributed databases: an open source system. Futur. Gener. Comput. Syst. 90, 105–117 (2019)

    Article  Google Scholar 

  11. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). https://bitcoin.org/bitcoin.pdf

  12. Nasrulin, B., Muzammal, M., Qu, Q.: ChainMOB: mobility analytics on blockchain. In: 19th IEEE International Conference on Mobile Data Management, MDM, pp. 292–293 (2018)

    Google Scholar 

  13. Ni, X., et al.: A mobile phone-based physical-social location proof system for mobile social network service. Secur. Commun. Netw. 9(13), 1890–1904 (2016)

    Google Scholar 

  14. Pham, A., Huguenin, K., Bilogrevic, I., Dacosta, I., Hubaux, J.P.: SecureRun: cheat-proof and private summaries for location-based activities. IEEE Trans. Mob. Comput. 15(8), 2109–2123 (2016)

    Article  Google Scholar 

  15. Qu, Q., Liu, S., et al.: Efficient online summarization of large-scale dynamic networks. IEEE Trans. Knowl. Data Eng. 28(12), 3231–3245 (2016)

    Article  Google Scholar 

  16. Ranganathan, A., Capkun, S.: Are we really close? Verifying proximity in wireless systems. IEEE Secur. Priv. (2017)

    Google Scholar 

  17. Stadtler, H.: Supply chain management - an overview. In: Stadtler, H., Kilger, C. (eds.) Supply Chain Management and Advanced Planning, pp. 9–36. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-74512-9_2

  18. Underwood, S.: Blockchain beyond bitcoin. Commun. ACM 59(11), 15–17 (2016)

    Article  Google Scholar 

  19. Wan, J., Zou, C., Ullah, S., Lai, C., Zhou, M., Wang, X.: Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Network 27(5), 56–61 (2013)

    Article  Google Scholar 

  20. Wang, X., Pande, A.: STAMP: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans. Netw. 24(6), 3276–3289 (2016)

    Article  Google Scholar 

  21. Waters, B., Felten, E.: Secure, private proofs of location. Department of Computer Science, Princeton University, Princeton, NJ, USA, Technical report (2003)

    Google Scholar 

  22. Yang, J., Chen, Y., Trappe, W., Cheng, J.: Detection and localization of multiple spoofing attackers in wireless networks. IEEE Trans. Parallel Distrib. Syst. 24(1), 44–58 (2013)

    Article  Google Scholar 

Download references

Acknowledgments

The work was partially supported by the CAS Pioneer Hundred Talents Program, China [grant number Y84402, 2017], and CAS President’s International Fellowship Initiative, China [grant number 2018VTB0005, 2018].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiang Qu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nasrulin, B., Muzammal, M., Qu, Q. (2018). A Robust Spatio-Temporal Verification Protocol for Blockchain. In: Hacid, H., Cellary, W., Wang, H., Paik, HY., Zhou, R. (eds) Web Information Systems Engineering – WISE 2018. WISE 2018. Lecture Notes in Computer Science(), vol 11233. Springer, Cham. https://doi.org/10.1007/978-3-030-02922-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02922-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02921-0

  • Online ISBN: 978-3-030-02922-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics