Skip to main content

BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof

  • Conference paper
  • First Online:
Book cover Algorithms and Architectures for Parallel Processing (ICA3PP 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12454))

Abstract

Location based services (LBS), as an important part of people’s everyday life, rely on current/historical location information to offer services. However, malicious users may generate some fake information to cheat providers to obtain more profits. Currently, existing schemes directly leverage GPS or a centralized party to claim location information, which may be easily counterfeited or result in leakage of users’ privacy. To authenticate the location information, an interactive scheme can be introduced to allow a mobile user as prover to generate proofs of location by exploiting neighboring nodes as witnesses. However, owing to the selfishness of users, it is a great challenge to encourage witnesses to generate proofs. Moreover, witnesses will not be willing to generate proofs unless that their privacy is under well protection. To tackle the above issues, we propose a blockchain-based incentive mechanism with privacy preserving in location proof. First, a novel blockchain system is introduced for interactive location proof to generate secure and trustworthy proofs through the use of distributed ledgers and cryptocurrency. Second, a proof of points protocol is proposed to efficiently reach consensus to build location proof blockchain and incentivise users. Third, motivated by security problem, a novel concept of traceable-detectable-prefix is developed to resist collusion attacks while protecting users’ privacy. Finally, theoretical analysis and simulation experiments are provided, which demonstrate that the proposed scheme can provide complete location proof while protecting privacy of users.

This work is supported by the National Key Research and Development Program of China (No. 2018YFB0204301), NUDT Research Grants (No. ZK19-38), Open Foundation of State Key Laboratory of Cryptology (No: MMKFKT201617), and National Nature Science Foundation of China (grant 61572026, 61872372).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Luo, W., Hengartner, U.: Proving your location without giving up your privacy. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 7–12 (2010)

    Google Scholar 

  2. Bagci, H., Karagoz., P.: Context-aware friend recommendation for location based social networks using random walk. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 531–536 (2016)

    Google Scholar 

  3. Liu, W., Yang, Y., Wang, E., Jie, W.: User recruitment for enhancing data inference accuracy in sparse mobile crowdsensing. IEEE Internet Things J. 7(3), 1802–1814 (2019)

    Article  Google Scholar 

  4. Gambs, S., Killijian, M.-O., Roy, M., Traoré, M.: PROPS: a privacy-preserving location proof system. In: IEEE 33rd International Symposium on Reliable Distributed Systems, pp. 1–10. IEEE (2014)

    Google Scholar 

  5. Wang, X., Pande, A., Zhu, J., Mohapatra, P.: Stamp: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans. Network. 24(6), 3276–3289 (2016)

    Article  Google Scholar 

  6. Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, pp. 1–6 (2009)

    Google Scholar 

  7. Hasan, R., Burns, R.: Where have you been? Secure location provenance for mobile devices. arXiv preprint arXiv:1107.1821 (2011)

  8. Davis, B., Chen, H., Franklin, M.: Privacy-preserving alibi systems. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 34–35 (2012)

    Google Scholar 

  9. Ferreira, J., Pardal, M.L.: Witness-based location proofs for mobile devices. In: IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1–4. IEEE (2018)

    Google Scholar 

  10. Lee, J.H., Buehrer, R.M.: Characterization and detection of location spoofing attacks. J. Commun. Networks 14(4), 396–409 (2012)

    Article  Google Scholar 

  11. Kasori, K., Sato, F.: Location privacy protection considering the location safety. In: 18th International Conference on Network-Based Information Systems, pp. 140–145. IEEE (2015)

    Google Scholar 

  12. Zhu, Z., Cao, G.: Toward privacy preserving and collusion resistance in a location proof updating system. IEEE Trans. Mob. Comput. 12(1), 51–64 (2011)

    Article  Google Scholar 

  13. Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)

    Article  Google Scholar 

  14. Peng, D., Wu, F., Chen, G.: Pay as how well you do: a quality based incentive mechanism for crowdsensing. In: Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 177–186 (2015)

    Google Scholar 

  15. Alswailim, M.A., Hassanein, H.S., Zulkernine, M.: A reputation system to evaluate participants for participatory sensing. In: IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2016)

    Google Scholar 

  16. Zhu, Z., Cao, G.: Applaus: a privacy-preserving location proof updating system for location-based services. In: 2011 Proceedings IEEE INFOCOM, pp. 1889–1897. IEEE (2011)

    Google Scholar 

  17. Kang, J., et al.: Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6(3), 4660–4670 (2018)

    Article  Google Scholar 

  18. Luo, W., Hengartner, U.: Veriplace: a privacy-aware location proof architecture. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 23–32 (2010)

    Google Scholar 

  19. Amoretti, M., Brambilla, G., Medioli, F., Zanichelli, F.: Blockchain-based proof of location. In: IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 146–153. IEEE (2018)

    Google Scholar 

  20. Dasu, T., Kanza, Y., Srivastava. D.: Unchain your blockchain. In: Proceedings of the Symposium on Foundations and Applications of Blockchain, vol. 1, pp. 16–23 (2018)

    Google Scholar 

  21. Liu, C.H., Lin, Q., Wen, S.: Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Trans. Ind. Inf. 15(6), 3516–3526 (2018)

    Article  Google Scholar 

  22. Li, Z., Kang, J., Rong, Yu., Ye, D., Deng, Q., Zhang, Y.: Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3690–3700 (2017)

    Google Scholar 

  23. Avoine, G., et al.: Security of distance-bounding: a survey. ACM Comput. Surv. (CSUR) 51(5), 1–33 (2018)

    Article  Google Scholar 

  24. Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowledge Data Eng. 30(7), 1366–1385 (2018)

    Article  Google Scholar 

  25. Halevi, S., Micali, S.: Practical and provably-secure commitment schemes from collision-free hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 201–215. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68697-5_16

    Chapter  Google Scholar 

  26. Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)

    Article  MathSciNet  Google Scholar 

  27. Wang, W., et al.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328–22370 (2019)

    Article  Google Scholar 

  28. Mitchell, J.C.: Probabilistic polynomial-time process calculus and security protocol analysis. In: Sands, D. (ed.) ESOP 2001. LNCS, vol. 2028, pp. 23–29. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45309-1_2

    Chapter  Google Scholar 

  29. Bussard, L., Bagga, W.: Distance-bounding proof of knowledge to avoid real-time attacks. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds.) SEC 2005. IAICT, vol. 181, pp. 223–238. Springer, Boston, MA (2005). https://doi.org/10.1007/0-387-25660-1_15

    Chapter  Google Scholar 

  30. Yao, M.-L., Chuang, M.-C., Hsu, C.-C.: The kano model analysis of features for mobile security applications. Comput. Secur. 78, 336–346 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuchuan Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lin, Z., Luo, Y., Fu, S., Xie, T. (2020). BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof. In: Qiu, M. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2020. Lecture Notes in Computer Science(), vol 12454. Springer, Cham. https://doi.org/10.1007/978-3-030-60248-2_35

Download citation

Publish with us

Policies and ethics