Secure Verification of Location Claims for Mobile Users
DOI:
https://doi.org/10.26438/ijcse/v5i11.171176Keywords:
Location proof, privacy, spatial-temporal provenance, trustAbstract
Area based administrations are rapidly winding up monstrously famous. Notwithstanding administrations in light of clients' present area; numerous potential administrations depend on clients of their area history. “Harmful clients may lie about the spatial-impermanent provenance without an effectively masterminded security structure for clients to display their past zones. In this paper, I demonstrate the Spatial-Fleeting provenance Confirmation with Common Evidences (STAMP) conspires”. STAMP is intended for specially appointed portable clients that are producing area proofs for each other in a disseminated setting. In any case, it can stretch much more without trusted versatile clients and remote access focuses. “STAMP ensures the uprightness and non-transferability of the territory proofs and guarantees customers' security. A semi-trusted Confirmation Specialist is used to pass on cryptographic keys in extension which screen the clients against intrigue by a light-weight entropy-based trust in examination air”. This model of execution on the Android stage demonstrates that STAMP is effortlessness as far as computational and capacity assets. Broad recreation tests demonstrate that entropy-based trust display can accomplish high conspiracy discovery precision.
References
S. Saroiu and A. Wolman, "Empowering new versatile applications with area proofs," in Proc. ACM HotMobile, 2009, Art. No. 3.
W. Luo and U. Hengartner, "VeriPlace: A security mindful area verification engineering," in Proc. ACM GIS, 2010, pp. 23– 32.
Z. Zhu and G. Cao, "Towards security saving and intriguing protection in area verification refreshing framework," IEEE Trans. Versatile Comput., vol. 12, no. 1, pp. 51– 64, Jan. 2011.
N. Sastry, U. Shankar, and D. Wagner, "Secure check of area claims," in Proc. ACM WiSe, 2003, pp. 1– 10.
Y. Desmedt, "Significant security issues with the 'unforgeable' (feige)- fiat-shamir verifications of personality and how to defeat them," in Proc. SecuriCom, 1988, pp. 15– 17.
B. Waters and E. Felten, "Secure, private verifications of area," Department of Computer Science, Princeton University, Princeton, NJ, USA, Tech. Rep., 2003.
X. Wang et al., "STAMP: Ad hoc spatial-worldly provenance affirmation for portable clients," in Proc. IEEE ICNP, 2013, pp. 1– 10.
A. Pfitzmann and M. Köhntopp, "Secrecy, imperceptibility, and pseudonymity-a proposition for wording," in Designing Privacy Enhancing Technologies. New York, NY, USA: Springer, 2001.
D. Singelee and B. Preneel, "Area confirmation utilizing secure separation bouncing conventions," in Proc. IEEE MASS, 2005.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
