Skip to main content
Top

2020 | OriginalPaper | Chapter

BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof

Authors : Zhen Lin, Yuchuan Luo, Shaojing Fu, Tao Xie

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Location based services (LBS), as an important part of people’s everyday life, rely on current/historical location information to offer services. However, malicious users may generate some fake information to cheat providers to obtain more profits. Currently, existing schemes directly leverage GPS or a centralized party to claim location information, which may be easily counterfeited or result in leakage of users’ privacy. To authenticate the location information, an interactive scheme can be introduced to allow a mobile user as prover to generate proofs of location by exploiting neighboring nodes as witnesses. However, owing to the selfishness of users, it is a great challenge to encourage witnesses to generate proofs. Moreover, witnesses will not be willing to generate proofs unless that their privacy is under well protection. To tackle the above issues, we propose a blockchain-based incentive mechanism with privacy preserving in location proof. First, a novel blockchain system is introduced for interactive location proof to generate secure and trustworthy proofs through the use of distributed ledgers and cryptocurrency. Second, a proof of points protocol is proposed to efficiently reach consensus to build location proof blockchain and incentivise users. Third, motivated by security problem, a novel concept of traceable-detectable-prefix is developed to resist collusion attacks while protecting users’ privacy. Finally, theoretical analysis and simulation experiments are provided, which demonstrate that the proposed scheme can provide complete location proof while protecting privacy of users.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Luo, W., Hengartner, U.: Proving your location without giving up your privacy. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 7–12 (2010) Luo, W., Hengartner, U.: Proving your location without giving up your privacy. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 7–12 (2010)
2.
go back to reference Bagci, H., Karagoz., P.: Context-aware friend recommendation for location based social networks using random walk. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 531–536 (2016) Bagci, H., Karagoz., P.: Context-aware friend recommendation for location based social networks using random walk. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 531–536 (2016)
3.
go back to reference Liu, W., Yang, Y., Wang, E., Jie, W.: User recruitment for enhancing data inference accuracy in sparse mobile crowdsensing. IEEE Internet Things J. 7(3), 1802–1814 (2019)CrossRef Liu, W., Yang, Y., Wang, E., Jie, W.: User recruitment for enhancing data inference accuracy in sparse mobile crowdsensing. IEEE Internet Things J. 7(3), 1802–1814 (2019)CrossRef
4.
go back to reference Gambs, S., Killijian, M.-O., Roy, M., Traoré, M.: PROPS: a privacy-preserving location proof system. In: IEEE 33rd International Symposium on Reliable Distributed Systems, pp. 1–10. IEEE (2014) Gambs, S., Killijian, M.-O., Roy, M., Traoré, M.: PROPS: a privacy-preserving location proof system. In: IEEE 33rd International Symposium on Reliable Distributed Systems, pp. 1–10. IEEE (2014)
5.
go back to reference Wang, X., Pande, A., Zhu, J., Mohapatra, P.: Stamp: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans. Network. 24(6), 3276–3289 (2016)CrossRef Wang, X., Pande, A., Zhu, J., Mohapatra, P.: Stamp: enabling privacy-preserving location proofs for mobile users. IEEE/ACM Trans. Network. 24(6), 3276–3289 (2016)CrossRef
6.
go back to reference Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, pp. 1–6 (2009) Saroiu, S., Wolman, A.: Enabling new mobile applications with location proofs. In: Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, pp. 1–6 (2009)
7.
8.
go back to reference Davis, B., Chen, H., Franklin, M.: Privacy-preserving alibi systems. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 34–35 (2012) Davis, B., Chen, H., Franklin, M.: Privacy-preserving alibi systems. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 34–35 (2012)
9.
go back to reference Ferreira, J., Pardal, M.L.: Witness-based location proofs for mobile devices. In: IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1–4. IEEE (2018) Ferreira, J., Pardal, M.L.: Witness-based location proofs for mobile devices. In: IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1–4. IEEE (2018)
10.
go back to reference Lee, J.H., Buehrer, R.M.: Characterization and detection of location spoofing attacks. J. Commun. Networks 14(4), 396–409 (2012)CrossRef Lee, J.H., Buehrer, R.M.: Characterization and detection of location spoofing attacks. J. Commun. Networks 14(4), 396–409 (2012)CrossRef
11.
go back to reference Kasori, K., Sato, F.: Location privacy protection considering the location safety. In: 18th International Conference on Network-Based Information Systems, pp. 140–145. IEEE (2015) Kasori, K., Sato, F.: Location privacy protection considering the location safety. In: 18th International Conference on Network-Based Information Systems, pp. 140–145. IEEE (2015)
12.
go back to reference Zhu, Z., Cao, G.: Toward privacy preserving and collusion resistance in a location proof updating system. IEEE Trans. Mob. Comput. 12(1), 51–64 (2011)CrossRef Zhu, Z., Cao, G.: Toward privacy preserving and collusion resistance in a location proof updating system. IEEE Trans. Mob. Comput. 12(1), 51–64 (2011)CrossRef
13.
go back to reference Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef
14.
go back to reference Peng, D., Wu, F., Chen, G.: Pay as how well you do: a quality based incentive mechanism for crowdsensing. In: Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 177–186 (2015) Peng, D., Wu, F., Chen, G.: Pay as how well you do: a quality based incentive mechanism for crowdsensing. In: Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 177–186 (2015)
15.
go back to reference Alswailim, M.A., Hassanein, H.S., Zulkernine, M.: A reputation system to evaluate participants for participatory sensing. In: IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2016) Alswailim, M.A., Hassanein, H.S., Zulkernine, M.: A reputation system to evaluate participants for participatory sensing. In: IEEE Global Communications Conference (GLOBECOM), pp. 1–6. IEEE (2016)
16.
go back to reference Zhu, Z., Cao, G.: Applaus: a privacy-preserving location proof updating system for location-based services. In: 2011 Proceedings IEEE INFOCOM, pp. 1889–1897. IEEE (2011) Zhu, Z., Cao, G.: Applaus: a privacy-preserving location proof updating system for location-based services. In: 2011 Proceedings IEEE INFOCOM, pp. 1889–1897. IEEE (2011)
17.
go back to reference Kang, J., et al.: Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6(3), 4660–4670 (2018)CrossRef Kang, J., et al.: Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet Things J. 6(3), 4660–4670 (2018)CrossRef
18.
go back to reference Luo, W., Hengartner, U.: Veriplace: a privacy-aware location proof architecture. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 23–32 (2010) Luo, W., Hengartner, U.: Veriplace: a privacy-aware location proof architecture. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 23–32 (2010)
19.
go back to reference Amoretti, M., Brambilla, G., Medioli, F., Zanichelli, F.: Blockchain-based proof of location. In: IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 146–153. IEEE (2018) Amoretti, M., Brambilla, G., Medioli, F., Zanichelli, F.: Blockchain-based proof of location. In: IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 146–153. IEEE (2018)
20.
go back to reference Dasu, T., Kanza, Y., Srivastava. D.: Unchain your blockchain. In: Proceedings of the Symposium on Foundations and Applications of Blockchain, vol. 1, pp. 16–23 (2018) Dasu, T., Kanza, Y., Srivastava. D.: Unchain your blockchain. In: Proceedings of the Symposium on Foundations and Applications of Blockchain, vol. 1, pp. 16–23 (2018)
21.
go back to reference Liu, C.H., Lin, Q., Wen, S.: Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Trans. Ind. Inf. 15(6), 3516–3526 (2018)CrossRef Liu, C.H., Lin, Q., Wen, S.: Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning. IEEE Trans. Ind. Inf. 15(6), 3516–3526 (2018)CrossRef
22.
go back to reference Li, Z., Kang, J., Rong, Yu., Ye, D., Deng, Q., Zhang, Y.: Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3690–3700 (2017) Li, Z., Kang, J., Rong, Yu., Ye, D., Deng, Q., Zhang, Y.: Consortium blockchain for secure energy trading in industrial internet of things. IEEE Trans. Ind. Inf. 14(8), 3690–3700 (2017)
23.
go back to reference Avoine, G., et al.: Security of distance-bounding: a survey. ACM Comput. Surv. (CSUR) 51(5), 1–33 (2018)CrossRef Avoine, G., et al.: Security of distance-bounding: a survey. ACM Comput. Surv. (CSUR) 51(5), 1–33 (2018)CrossRef
24.
go back to reference Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowledge Data Eng. 30(7), 1366–1385 (2018)CrossRef Dinh, T.T.A., Liu, R., Zhang, M., Chen, G., Ooi, B.C., Wang, J.: Untangling blockchain: a data processing view of blockchain systems. IEEE Trans. Knowledge Data Eng. 30(7), 1366–1385 (2018)CrossRef
26.
go back to reference Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRef Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRef
27.
go back to reference Wang, W., et al.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328–22370 (2019)CrossRef Wang, W., et al.: A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7, 22328–22370 (2019)CrossRef
30.
go back to reference Yao, M.-L., Chuang, M.-C., Hsu, C.-C.: The kano model analysis of features for mobile security applications. Comput. Secur. 78, 336–346 (2018)CrossRef Yao, M.-L., Chuang, M.-C., Hsu, C.-C.: The kano model analysis of features for mobile security applications. Comput. Secur. 78, 336–346 (2018)CrossRef
Metadata
Title
BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof
Authors
Zhen Lin
Yuchuan Luo
Shaojing Fu
Tao Xie
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-60248-2_35

Premium Partner