Академический Документы
Профессиональный Документы
Культура Документы
Supporting Spatial-Tempo
Temporal
ral Provenance Location Proofs for
f
Ad
Ad-Hoc Mobile Users
K. Dhanalakshmi
Lecturer Sr. Grade
Grade, Department of Computer Engineering,
Ayya Nadar Janaki Ammal Polytechnic College
College, Sivakasi, Tamilnadu,
Tamilnadu India
ABSTRACT
Spatial-Temporal
Temporal Provence (STP) are quickly current location. Users discover their locations and
becoming immensely popular. In apply the position share them with a server. In turn, the server performs
that users of the communicate to the location-based computation based on the location information and
services (LBS). Malicious users may lie about their returns data/services to the users. In addition to users'
spatial-temporal
temporal provenance (STP) without a carefully current locations, there is an increased trend and
designed security system for users to prove their past incentive to prove/validate mobile users' past
locations. This type of attack will have a severe geographical locations. This opens a wide variety of
impact on applications of the period of time traffic new location-proof
proof based mobile applications. Let us
office, location based on the access management, the consider three examples: (1) A store wants to offer
traffic of the process to be in electronic election. In discounts to frequent customers. Customers must be
this paper, we present the Spatial Spatial-Temporal able to show evidence of their repeated visits in the
provenance Assurance with Mutual Proofs (STAMP) past to the store. (2) A company which promotes
scheme. STAMP is designed for ad-hoc hoc mobile users green commuting and wellness may reward their
generating location proofs for each other in a employees who walk or bike to work. The company
distributed setting. However, LP versions can easily may encourage daily walking goals of some fixed
accommodate trusted mobile users and wireless number of miles. Employeess need to prove their past
access points. STAMP ensures the integrity and non non- commuting paths to the company along with time
transferability of the location proofs aand protects history. This helps the company in reducing the
users privacy. A semi-trusted
trusted Certification Authority healthcare insurance rates and move towards
is used to distribute cryptographic keys as well as sustainable lifestyle. (3) On the battlefield, when a
guard users against collusion by a light light-weight scout group is sent out to execute a mission, the
entropy-based
based trust evaluation approach. Our commanding centre may want every soldier to keep a
prototype implementation on the Android platf platform copy of their location traces for investigation purpose
shows that STAMP is low-cost cost in terms of after the mission.
computational and storage resources. Extensive
simulation experiments show that our entropy
entropy-based The above applications require users to be able to
trust model is able to achieve high collusion detection obtain proofs from the locations they visit. Users may
accuracy. then choose to present one or more of their proofs to a
third-party
party verifier to claim their presence at a
Keyword: spatial-temporal
temporal provenance, location location at a particular time. In this paper,
paper we define
proof and STAMP the past locations of a mobile user at a sequence of
time points as the spatial-temporal
temporal provenance (STP)
I. INTRODUCTION of the user, and a digital proof of user's presence at a
As location enabled mobile devices proliferate, location at a particular time as an STP proof. Many
location-based
based services are rapidly becoming works in liberation have referred
refe to such a proof as
immensely popular. Most of the current location
location- location proof .In this paper, we consider the two
based services for mobile devices are based on users' terms interchangeable. We prefer “STP proof”
Fig.1 An illustration
stration of system architecture
BA
conducted to achieve the same security property as the 1.5 σω=3
Bussard-Bagga
gga protocol with much better 1
σω=2
performance. A new distance bounding scheme can be 0.5
easily plugged into STAMP and replace the Bussard
Bussard- σω=1
0
Bagga protocol. It is also a part of our future work to 3 4 5 6 7 8 9
investigate such possibilities.
μῲ
0.5
0.6 PTU=0.01
BA
0.4
weighted 0.4 PTU=0.05
0.3
average 0.2 PTU=0.1
0.2
average 0
0.1
10 20 30 40 50 60
0 max
0.1 0.3 0.5 0.7 0.9 K
min
Ɵ Fig.10 BA under different k and percentage of trusted
users
Fig.7 BA under different trust consolidation functions
Bluetooth is a ubiquitous short-range,
short low-power
communication technology that also provides a robust
16 device discovery mechanism, making it a logical
choice for implementing our prototype. As observed
14 in evaluation, limited range and discovery latency due
12 to underlying Bluetooth technology exerts another
negative impact on performance of our protocol,
10
BA