Abstract
With location becoming one of the few key pieces of context regarding a user and services springing up to take advantage of this, location verification is an increasingly important system aspect, allowing these services to trust in a device’s supplied location. We propose to remove the burden of providing this feature from Location Based Services (LBS) through the introduction of ProVer, a system to provide verified location information regarding any mobile user employing a wireless device. ProVer does not rely on a pre-existing infrastructure to verify a device’s location but instead employs evidence from neighbouring devices to confirm a specific device’s presence, allowing almost unlimited reach in the system’s coverage. ProVer also ensures a device’s personal information, such as identity and location, remain private and secure, allowing devices to participate in the system with confidence.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
LBSZone (2009), http://www.lbszone.com
Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Supporting location-based conditions in access control policies. In: ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 212–222 (2006)
Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Trans. Inf. Syst. 10(1), 91–102 (1992)
Ward, A., Jones, A.: A new location technique for the active office. Personal Communications of the IEEE 4(5), 42–47 (1997)
Correal, N.S., Kyperountas, S., Shi, Q., Welborn, M.: An uwb relative location system. In: IEEE Conference on Ultra Wideband Systems and Technologies, pp. 394–397 (2003)
Bahl, P., Padmanabhan, V.N.: Radar: An in-building rf-based user location and tracking system. In: INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 775–784 (2000)
Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The cricket location-support system. In: MobiCom 2000: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 32–43. ACM, New York (2000)
Waters, B., Felten, E.: Secure, private proofs of location. Technical report, Princeton University (January 2003)
Sastry, N., Wagner, D.: Secure verification of location claims. In: WiSe 2003: Proceedings of the 2nd ACM workshop on Wireless security, pp. 1–10 (2003)
Vora, A., Nesterenko, M.: Secure location verification using radio broadcast. IEEE Transactions on Dependable and Secure Computing 3, 377–385 (2006)
Capkun, S., Cagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM 2006), pp. 1–10 (2006)
Čapkun, S., Rasmussen, K., Čagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. In: IEEE Educational Activities Department, vol. 7, pp. 470–483 (2008)
Capkun, S., Hubaux, J.P.: Securing position and distance verification in wireless networks. Technical report, EFPL (2004)
Mauve, M., Widmer, A., Hartenstein, H.: A survey on position-based routing in mobile ad hoc networks. IEEE Network 15(6), 30–39 (2001)
Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)
Graham, M., Gray, D.: Can you see me? the use of a binary visibility metric in distance bounding. In: Liu, B., Bestavros, A., Du, D.-Z., Wang, J. (eds.) Wireless Algorithms, Systems, and Applications. LNCS, vol. 5682, pp. 378–387. Springer, Heidelberg (2009)
Graham, M., Gray, D.: Protecting privacy and securing the gathering of location proofs - the secure location verification proof gathering protocol. In: Proceedings of the 1st International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2009) (June 2009)
Josang, A., Ismail, R.: The beta reputation system. In: e-Reality: Constructing the Economy (June 2002)
Buchegger, S., Boudec, J.Y.L.: A robust reputation system for mobile ad-hoc networks. Technical report (2003)
Lowe, G.: Casper: A compiler for the analysis of security protocols. In: IEEE Computer Security Foundations Workshop, p. 18 (1997)
Roscoe, A.W.: Modelling and verifying key-exchange protocols using csp and fdr. In: Computer Security Foundations Workshop, p. 98 (1995)
Rasmussen, K.B., Čapkun, S.: Location privacy of distance bounding protocols. In: CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security, pp. 149–160. ACM Press, New York (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Graham, M., Gray, D. (2010). ProVer: A Secure System for the Provision of Verified Location Information. In: Phan, T., Montanari, R., Zerfos, P. (eds) Mobile Computing, Applications, and Services. MobiCASE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12607-9_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-12607-9_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-12606-2
Online ISBN: 978-3-642-12607-9
eBook Packages: Computer ScienceComputer Science (R0)