Skip to main content

ProVer: A Secure System for the Provision of Verified Location Information

  • Conference paper
Mobile Computing, Applications, and Services (MobiCASE 2009)

Abstract

With location becoming one of the few key pieces of context regarding a user and services springing up to take advantage of this, location verification is an increasingly important system aspect, allowing these services to trust in a device’s supplied location. We propose to remove the burden of providing this feature from Location Based Services (LBS) through the introduction of ProVer, a system to provide verified location information regarding any mobile user employing a wireless device. ProVer does not rely on a pre-existing infrastructure to verify a device’s location but instead employs evidence from neighbouring devices to confirm a specific device’s presence, allowing almost unlimited reach in the system’s coverage. ProVer also ensures a device’s personal information, such as identity and location, remain private and secure, allowing devices to participate in the system with confidence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. LBSZone (2009), http://www.lbszone.com

  2. Ardagna, C.A., Cremonini, M., Damiani, E., di Vimercati, S.D.C., Samarati, P.: Supporting location-based conditions in access control policies. In: ASIACCS 2006: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 212–222 (2006)

    Google Scholar 

  3. Want, R., Hopper, A., Falcao, V., Gibbons, J.: The active badge location system. ACM Trans. Inf. Syst. 10(1), 91–102 (1992)

    Article  Google Scholar 

  4. Ward, A., Jones, A.: A new location technique for the active office. Personal Communications of the IEEE 4(5), 42–47 (1997)

    Article  Google Scholar 

  5. Correal, N.S., Kyperountas, S., Shi, Q., Welborn, M.: An uwb relative location system. In: IEEE Conference on Ultra Wideband Systems and Technologies, pp. 394–397 (2003)

    Google Scholar 

  6. Bahl, P., Padmanabhan, V.N.: Radar: An in-building rf-based user location and tracking system. In: INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 775–784 (2000)

    Google Scholar 

  7. Priyantha, N.B., Chakraborty, A., Balakrishnan, H.: The cricket location-support system. In: MobiCom 2000: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 32–43. ACM, New York (2000)

    Google Scholar 

  8. Waters, B., Felten, E.: Secure, private proofs of location. Technical report, Princeton University (January 2003)

    Google Scholar 

  9. Sastry, N., Wagner, D.: Secure verification of location claims. In: WiSe 2003: Proceedings of the 2nd ACM workshop on Wireless security, pp. 1–10 (2003)

    Google Scholar 

  10. Vora, A., Nesterenko, M.: Secure location verification using radio broadcast. IEEE Transactions on Dependable and Secure Computing 3, 377–385 (2006)

    Article  MATH  Google Scholar 

  11. Capkun, S., Cagalj, M., Srivastava, M.: Secure localization with hidden and mobile base stations. In: Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM 2006), pp. 1–10 (2006)

    Google Scholar 

  12. Čapkun, S., Rasmussen, K., Čagalj, M., Srivastava, M.: Secure location verification with hidden and mobile base stations. In: IEEE Educational Activities Department, vol. 7, pp. 470–483 (2008)

    Google Scholar 

  13. Capkun, S., Hubaux, J.P.: Securing position and distance verification in wireless networks. Technical report, EFPL (2004)

    Google Scholar 

  14. Mauve, M., Widmer, A., Hartenstein, H.: A survey on position-based routing in mobile ad hoc networks. IEEE Network 15(6), 30–39 (2001)

    Article  Google Scholar 

  15. Brands, S., Chaum, D.: Distance-bounding protocols (extended abstract). In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 344–359. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  16. Graham, M., Gray, D.: Can you see me? the use of a binary visibility metric in distance bounding. In: Liu, B., Bestavros, A., Du, D.-Z., Wang, J. (eds.) Wireless Algorithms, Systems, and Applications. LNCS, vol. 5682, pp. 378–387. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  17. Graham, M., Gray, D.: Protecting privacy and securing the gathering of location proofs - the secure location verification proof gathering protocol. In: Proceedings of the 1st International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MobiSec 2009) (June 2009)

    Google Scholar 

  18. Josang, A., Ismail, R.: The beta reputation system. In: e-Reality: Constructing the Economy (June 2002)

    Google Scholar 

  19. Buchegger, S., Boudec, J.Y.L.: A robust reputation system for mobile ad-hoc networks. Technical report (2003)

    Google Scholar 

  20. Lowe, G.: Casper: A compiler for the analysis of security protocols. In: IEEE Computer Security Foundations Workshop, p. 18 (1997)

    Google Scholar 

  21. Roscoe, A.W.: Modelling and verifying key-exchange protocols using csp and fdr. In: Computer Security Foundations Workshop, p. 98 (1995)

    Google Scholar 

  22. Rasmussen, K.B., Čapkun, S.: Location privacy of distance bounding protocols. In: CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security, pp. 149–160. ACM Press, New York (2008)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Graham, M., Gray, D. (2010). ProVer: A Secure System for the Provision of Verified Location Information. In: Phan, T., Montanari, R., Zerfos, P. (eds) Mobile Computing, Applications, and Services. MobiCASE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12607-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12607-9_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12606-2

  • Online ISBN: 978-3-642-12607-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics