2016
DOI: 10.1109/tnet.2016.2515119
|View full text |Cite
|
Sign up to set email alerts
|

STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(61 citation statements)
references
References 19 publications
0
50
0
Order By: Relevance
“…There has been an extensive study on the vulnerabilities and attacks in a proof of location context [1,[4][5][6]16]. Depending on the role, a malicious user has specific purposes which are detailed in the sequel.…”
Section: Malicious Users and Types Of Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…There has been an extensive study on the vulnerabilities and attacks in a proof of location context [1,[4][5][6]16]. Depending on the role, a malicious user has specific purposes which are detailed in the sequel.…”
Section: Malicious Users and Types Of Attacksmentioning
confidence: 99%
“…In the literature, various techniques are being used, such as distance bounding. Distance bounding consists of a fast bit exchange between prover and witness [4,16]. Those bits are related to cryptographic data that identify the users involved without exposing their identities.…”
Section: Proximity Testmentioning
confidence: 99%
“…A Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP) scheme is proposed by [136]. This scheme is based on a distributed architecture where ad-hoc mobile users generate location proofs for each other.…”
Section: ) Caching Schemes In Mobile Networkmentioning
confidence: 99%
“…(1) Spatio-temporal location. Several works [140,189,191,193,211] have proposed the use of spatio-temporal location of sensing reports to collect trustworthiness evidence. The rationale is that if the report is originated from a location closer to the event being monitored, and has been submitted before a given deadline, then the report and thus the participant is trustworthy.…”
Section: Collection Of Trustworthiness Evidencementioning
confidence: 99%