Abstract

In the current hyper-connected, data-driven era, smart devices are providing access to geolocation information, enabling a paradigm shift in diverse domains. Location proof systems utilize smart devices to provide witnessed proof of location to enable secure location-based services (LBS). Applications of location proof systems include safety, asset management and operations monitoring in health care, supply chain tracking, and Internet-of-Things (IoT)-based location intelligence in businesses. In this paper, we investigate the state of the art in location proof systems, examining design challenges and implementation considerations for application in the real world. To frame the analysis, we have developed a taxonomy of location proof systems and performed a comparative analysis over the common attributes, highlighting their strength and weaknesses. Furthermore, we have identified future trends for this increasingly important area of investigation and development.

Highlights

  • Location-based services (LBS) rely on user geolocation, typically sourced through smart devices, to enable a wide range of services such as route guidance using Google maps, location-based social networks (LBSN), locator services, and location-based content delivery

  • We have highlighted the need of location proof systems, design challenges and requirements; we have developed the taxonomy using the identified attributes; and we have discussed dimensions of location proof systems with respect to their application in diverse domains

  • We have provided a comparative analysis of schemes to give an insight into the technical aspects of location proof systems

Read more

Summary

Introduction

Location-based services (LBS) rely on user geolocation, typically sourced through smart devices, to enable a wide range of services such as route guidance using Google maps, location-based social networks (LBSN), locator services (nearest restaurants, stores, and ATM, etc.), and location-based content delivery (games, news, and weather updates, etc.). Can motivate users to provide false information regarding their location. For this reason, and others such as reliability and poor or compromised performance of devices, self-reported geolocation of user cannot be trusted without reservation. Others such as reliability and poor or compromised performance of devices, self-reported geolocation of user cannot be trusted without reservation As such, it is important—and challenging—to prove a user’s physical presence at a specific location at a specific time with a secure, reliable, and resilient process. The COVID-19 pandemic has disrupted the life and living pattern of everyone on this planet. To curb the spread of COVID-19 several contact tracing mobile applications have been developed [3]

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.