“…Proof-of-location systems have been widely studied [2], [3], [4], [5], [6], [7], [8], [10], [13], [29], [30]. Lack of formal security model has led to attacks on POL systems, for example, absence of the message travel time measurements makes POL in [6] and [31] vulnerable to relay attacks. Systems with formal security models [5], [8], [13] consider a single instance of the protocol and cannot be securely composed with other protocols.…”