2020
DOI: 10.3390/asi3020019
|View full text |Cite
|
Sign up to set email alerts
|

QuietPlace: An Ultrasound-Based Proof of Location Protocol with Strong Identities

Abstract: Location-based services are becoming extremely popular due to the widespread use of smartphones and other mobile and portable devices. These services mainly rely on the sincerity of users, who can spoof the location they report to them. For applications with higher security requirements, the user should be unable to report a location different than the real one. Proof of Location protocols provide a solution to secure localization by validating the device's location with the help of nearby nodes. We propose Qu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(8 citation statements)
references
References 22 publications
(48 reference statements)
0
8
0
Order By: Relevance
“…Proof-of-location systems have been widely studied [2], [3], [4], [5], [6], [7], [8], [10], [13], [29], [30]. Lack of formal security model has led to attacks on POL systems, for example, absence of the message travel time measurements makes POL in [6] and [31] vulnerable to relay attacks. Systems with formal security models [5], [8], [13] consider a single instance of the protocol and cannot be securely composed with other protocols.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Proof-of-location systems have been widely studied [2], [3], [4], [5], [6], [7], [8], [10], [13], [29], [30]. Lack of formal security model has led to attacks on POL systems, for example, absence of the message travel time measurements makes POL in [6] and [31] vulnerable to relay attacks. Systems with formal security models [5], [8], [13] consider a single instance of the protocol and cannot be securely composed with other protocols.…”
Section: Related Workmentioning
confidence: 99%
“…User anonymity is considered in [5], [8], [29], [30], and [31]. [29], [30] only provide anonymity against the verifier, and do not have formal security models.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…), which was efficient due to the use of the non-cryptographic technique for location verification. Idrees et al [ 51 , 52 ] have proposed secure provenance schemes in a distributed environment using aggregated signatures. Furthermore, the authors did not assume any transitive trust among consecutive colluding users, which is a stronger security model compared to previous studies.…”
Section: Related Workmentioning
confidence: 99%
“…A comparative analysis of essential security properties is also provided for various secure provenance schemes in these domains. QuietPlace [ 51 ], an ultrasound-based location proof system, is introduced and provides strong identities. Kounas et al [ 51 ] claim to provide strong user privacy using an ultrasound-based approach while proving the physical presence of a user at a claimed location.…”
Section: Related Workmentioning
confidence: 99%