Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Lockr: social access control for web 2.0
Proceedings of the first workshop on Online social networks
Location-based trust for mobile user-generated content: applications, challenges and implementations
Proceedings of the 9th workshop on Mobile computing systems and applications
An offline foundation for online accountable pseudonyms
Proceedings of the 1st Workshop on Social Network Systems
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Proving your location without giving up your privacy
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Toward trustworthy mobile sensing
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
I am a sensor, and I approve this message
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Growing an organic indoor location system
Proceedings of the 8th international conference on Mobile systems, applications, and services
Ensemble: cooperative proximity-based authentication
Proceedings of the 8th international conference on Mobile systems, applications, and services
VeriPlace: a privacy-aware location proof architecture
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Practical NFC peer-to-peer relay attack using mobile phones
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
YouProve: authenticity and fidelity in mobile sensing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Selective location blinding using hash chains
SP'11 Proceedings of the 19th international conference on Security Protocols
Software abstractions for trusted sensors
Proceedings of the 10th international conference on Mobile systems, applications, and services
The shy mayor: private badges in geosocial networks
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Towards reliable spatial information in LBSNs
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
Selective and confidential message exchange in vehicular ad hoc networks
NSS'12 Proceedings of the 6th international conference on Network and System Security
The man who was there: validating check-ins in location-based services
Proceedings of the 29th Annual Computer Security Applications Conference
ACM SIGMOBILE Mobile Computing and Communications Review
Hi-index | 0.00 |
Location is rapidly becoming the next "killer application" as location-enabled mobile handheld devices proliferate. One class of applications that has yet-to-emerge are those in which users have an incentive to lie about their location. These applications cannot rely solely on the users' devices to discover and transmit location information because users have an incentive to cheat. Instead, such applications require their users to prove their locations. Unfortunately, today's mobile users lack a mechanism to prove their current or past locations. Consequently, these applications have yet to take off despite their potential. This paper presents location proofs - a simple mechanism that enables the emergence of mobile applications that require "proof" of a user's location. A location proof is a piece of data that certifies a receiver to a geographical location. Location proofs are handed out by the wireless infrastructure (e.g., a Wi-Fi access point or a cell tower) to mobile devices. The relatively short range of the wireless radios ensures that these devices are in physical proximity to the wireless transmitter. As a result, these devices are capable of proving their current or past locations to mobile applications. In this paper, we start by describing a mechanism to implement location proofs. We then present a set of six future applications that require location proofs to enable their core functionality.