2020
DOI: 10.3390/electronics9111776
|View full text |Cite
|
Sign up to set email alerts
|

Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative Analysis

Abstract: In the current hyper-connected, data-driven era, smart devices are providing access to geolocation information, enabling a paradigm shift in diverse domains. Location proof systems utilize smart devices to provide witnessed proof of location to enable secure location-based services (LBS). Applications of location proof systems include safety, asset management and operations monitoring in health care, supply chain tracking, and Internet-of-Things (IoT)-based location intelligence in businesses. In this paper, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 48 publications
0
4
0
Order By: Relevance
“…Similarly, the model detected all 1-and 2-type attacks because the probability of attacks 1 and 2 executing in a sequence consistent with the model is very low. If there are 9999 registers that can be read (in the range 30,001 to 39,999) and 9999 registers that can be written (in the range 40,001 to 49,999), then the probabilities can be described by ( 4) and (5). P(read register == 30,001) = 1/9999 (4) P(write register == 40,001) = 1/9999…”
Section: Graphmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, the model detected all 1-and 2-type attacks because the probability of attacks 1 and 2 executing in a sequence consistent with the model is very low. If there are 9999 registers that can be read (in the range 30,001 to 39,999) and 9999 registers that can be written (in the range 40,001 to 49,999), then the probabilities can be described by ( 4) and (5). P(read register == 30,001) = 1/9999 (4) P(write register == 40,001) = 1/9999…”
Section: Graphmentioning
confidence: 99%
“…In recent years, interest in cybersecurity issues has grown significantly due to Industry 4.0 [1][2][3] and IoT [4,5], autonomous cars, autonomous vacuum cleaners, and the development of "smart" devices that often cooperate or communicate with other surrounding devices. The convenience of using modern technology and the possibility to constantly monitor devices from anywhere over the Internet also brings new threats, namely by opening the door to other network users.…”
Section: Introductionmentioning
confidence: 99%
“…When attempting to decipher the data from a different location, the decryption attempt fails and no information about the plain text is disclosed. Before further discussion, the comparative analysis of technical aspects related to location proof systems and location model design challenges 19 should be surveyed to achieve a depth of the possible issues in a system. Calculation of the distances 10 between the IoE devices in real‐time is a significant procedure and this proposed approach incorporates Haversine formula to calculate the distance(s) between the devices because it is computationally easy and consumes less energy in IoE devices as compared with the other known procedures.…”
Section: Literature Surveymentioning
confidence: 99%
“…Boeira et al (2019) developed a scheme using cryptographic primitives and mobility awareness to improve the trustworthiness of shared vehicle location information in high-speed scenarios. Zafar et al (2020) also summarized a state-of-the-art location proof system and highlighted current challenges such as collusion resistance (malicious location and noise) and storage (redundancy in blockchain but untrustworthy in distributed devices). Some off-the-shelf decentralized blockchain oracle solutions for commercial applications have been summarized…”
Section: Blockchain Oraclesmentioning
confidence: 99%