Location proof systems for smart internet of things: Requirements, taxonomy, and comparative analysis

F Zafar, A Khan, A Anjum, C Maple, MA Shah - Electronics, 2020 - mdpi.com
In the current hyper-connected, data-driven era, smart devices are providing access to
geolocation information, enabling a paradigm shift in diverse domains. Location proof …

Blockchain-based proof of location

M Amoretti, G Brambilla, F Medioli… - … on Software Quality …, 2018 - ieeexplore.ieee.org
Location-Based Services (LBSs) build upon geographic information to provide users with
location-dependent functionalities. In such a context, it is particularly important that …

Proof of witness presence: Blockchain consensus for augmented democracy in smart cities

E Pournaras - Journal of Parallel and Distributed Computing, 2020 - Elsevier
Smart Cities evolve into complex and pervasive urban environments with a citizens'
mandate to meet sustainable development goals. Repositioning democratic values of …

Blockchain for secure location verification

MR Nosouhi, S Yu, W Zhou, M Grobler… - Journal of Parallel and …, 2020 - Elsevier
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …

Blockchain based zero-knowledge proof of location in iot

W Wu, E Liu, X Gong, R Wang - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
With the development of precise positioning technology, a growing number of location-
based services (LBSs) facilitate people's life. Most LBSs require proof of location (PoL) to …

Pasport: A secure and private location proof generation and verification framework

MR Nosouhi, K Sood, S Yu, M Grobler… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …

Accelerometer and fuzzy vault-based secure group key generation and sharing protocol for smart wearables

G Revadigar, C Javali, W Xu… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
The increased usage of smart wearables in various applications, specifically in health-care,
emphasizes the need for secure communication to transmit sensitive health-data. In a …

Traffic flow monitoring systems in smart cities: Coverage and distinguishability among vehicles

H Zheng, W Chang, J Wu - Journal of Parallel and Distributed Computing, 2019 - Elsevier
Traffic flow monitoring systems aim to measure and monitor vehicle trajectories in smart
cities. Their critical applications include vehicle theft prevention, vehicle localization, and …

Comparative analysis of localization techniques used in lbs

M Kenan - 2021 5th International Conference on Computing …, 2021 - ieeexplore.ieee.org
In the past two decades, there has been rapid growth in the number of mobile devices. Most
of these mobile devices can sense different types of wireless signals (eg, GPS, Wi-Fi …

A robust spatio-temporal verification protocol for blockchain

B Nasrulin, M Muzammal, Q Qu - … , United Arab Emirates, November 12-15 …, 2018 - Springer
Massive Spatio-temporal data is increasingly collected in a variety of domains including
supply chain. The authenticity as well as the security of such data is usually a concern due to …