2017
DOI: 10.1109/tmc.2017.2683492
|View full text |Cite
|
Sign up to set email alerts
|

Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location Disclosure

Abstract: Since the boom of smartphones and location-based services, spatio-temporal data (i.e., user locations with timestamps) have become increasingly essential in many real-life applications. To ensure these data are faithfully extracted from the underlying location tracking hardware and not altered by any malicious party or the user himself/herself, integrity assurance schemes such as digital signatures or message authentication codes (MAC) must be adopted. However, these conventional schemes disclose to the verifi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Location Proof Systems Based on Symmetric Cryptographic Primitives: Haibu et al [59] proposed a spatiotemporal integrity scheme using a prefix-verifiable message authentication code to achieve unforgeable location evidence on mobile devices. The threat model of the scheme assumes the user and the verifier both are semi-trusted.…”
Section: Limited Location Privacy Protection Againstmentioning
confidence: 99%
See 1 more Smart Citation
“…Location Proof Systems Based on Symmetric Cryptographic Primitives: Haibu et al [59] proposed a spatiotemporal integrity scheme using a prefix-verifiable message authentication code to achieve unforgeable location evidence on mobile devices. The threat model of the scheme assumes the user and the verifier both are semi-trusted.…”
Section: Limited Location Privacy Protection Againstmentioning
confidence: 99%
“…A promising feature of the scheme is support for spatiotemporal predicates. The method presented in [59] has a location authenticator module, which relies on the CPU security (e.g., ARM's TrustZone and Intel's trusted execution technology) to boot-load a trusted environment for providing enterprise-level security. Samsung KNOX is another example of providing a trusted environment in smart devices.…”
Section: Limited Location Privacy Protection Againstmentioning
confidence: 99%