Location proof systems for smart internet of things: Requirements, taxonomy, and comparative analysis
In the current hyper-connected, data-driven era, smart devices are providing access to
geolocation information, enabling a paradigm shift in diverse domains. Location proof …
geolocation information, enabling a paradigm shift in diverse domains. Location proof …
Blockchain-based proof of location
M Amoretti, G Brambilla, F Medioli… - … on Software Quality …, 2018 - ieeexplore.ieee.org
Location-Based Services (LBSs) build upon geographic information to provide users with
location-dependent functionalities. In such a context, it is particularly important that …
location-dependent functionalities. In such a context, it is particularly important that …
Proof of witness presence: Blockchain consensus for augmented democracy in smart cities
E Pournaras - Journal of Parallel and Distributed Computing, 2020 - Elsevier
Smart Cities evolve into complex and pervasive urban environments with a citizens'
mandate to meet sustainable development goals. Repositioning democratic values of …
mandate to meet sustainable development goals. Repositioning democratic values of …
Blockchain for secure location verification
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …
illegally access a service or obtain benefit. To address this issue, a number of location proof …
Blockchain based zero-knowledge proof of location in iot
With the development of precise positioning technology, a growing number of location-
based services (LBSs) facilitate people's life. Most LBSs require proof of location (PoL) to …
based services (LBSs) facilitate people's life. Most LBSs require proof of location (PoL) to …
Pasport: A secure and private location proof generation and verification framework
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …
which users submit their location information to service providers in order to gain access to a …
Accelerometer and fuzzy vault-based secure group key generation and sharing protocol for smart wearables
The increased usage of smart wearables in various applications, specifically in health-care,
emphasizes the need for secure communication to transmit sensitive health-data. In a …
emphasizes the need for secure communication to transmit sensitive health-data. In a …
Traffic flow monitoring systems in smart cities: Coverage and distinguishability among vehicles
Traffic flow monitoring systems aim to measure and monitor vehicle trajectories in smart
cities. Their critical applications include vehicle theft prevention, vehicle localization, and …
cities. Their critical applications include vehicle theft prevention, vehicle localization, and …
Comparative analysis of localization techniques used in lbs
M Kenan - 2021 5th International Conference on Computing …, 2021 - ieeexplore.ieee.org
In the past two decades, there has been rapid growth in the number of mobile devices. Most
of these mobile devices can sense different types of wireless signals (eg, GPS, Wi-Fi …
of these mobile devices can sense different types of wireless signals (eg, GPS, Wi-Fi …
A robust spatio-temporal verification protocol for blockchain
Massive Spatio-temporal data is increasingly collected in a variety of domains including
supply chain. The authenticity as well as the security of such data is usually a concern due to …
supply chain. The authenticity as well as the security of such data is usually a concern due to …