PASPORT A Secure and Private Location Proof Generation and Verification Framework
PASPORT A Secure and Private Location Proof Generation and Verification Framework
https://doi.org/10.22214/ijraset.2023.50394
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Abstract: Recently, there has been a rapid growth in locationbased systems and applications in which users submit their location
information to service providers in order to gain access to a service, resource, or reward. We have seen that in these applications,
dishonest users have an incentive to cheat on their location. Unfortunately, no effective protection mechanism has been adopted
by service providers against these fake location submissions. This is a critical issue that causes severe consequences for these
applications. Motivated by this, we propose the Privacy-Aware and Secure Proof Of pRoximiTy (PASPORT) scheme in this
article to address the problem. Using PASPORT, users submit a location proof (LP) to service providers to prove that their
submitted location is true. PASPORT has a decentralized architecture designed for ad hoc scenarios in which mobile users can
act as witnesses and generate LPs for each other. It provides user privacy protection as well as security properties, such as
unforgeability and non transferability of LPs. Furthermore, the PASPORT scheme is resilient to prover–prover collusions and
significantly reduces the success probability of Prover–Witness collusion attacks. To further make the proximity checking
process private, we propose P-TREAD, a privacy-aware distance bounding protocol and integrate it into PASPORT. To validate
our model, we implement a prototype of the proposed scheme on the Android platform. Extensive experiments indicate that the
proposed method can efficiently protect location-based applications against fake submissions
Keywords: Distance bounding (DB), location privacy, location proof (LP) location-based services (LBSs).
I. INTRODUCTION
The recent advances in the smartphone technology and positioning systems has resulted in the emergence of a variety of location-
based applications and services such as activity tracking applications, location-based services (LBSs), database-driven cognitive
radio networks (CRNs), and location-based access control systems. In these applications, mobile users submit their position data to
a location-based service provider (LBSP) to gain access to a service, resource, or reward. These applications are very popular due
to the useful services they offer. According to recent business reports, the market value of LBSs was U.S. $20.53 billion in 2017
and is anticipated to reach U.S. $133 billion in 2023, with an expected annual growth rate of 36.55%. However, LBSPs are
vulnerable to location spoofing attacks since dishonest users are incentivized to lie about their location and submit fake position
data. This is a critical issue that causes severe consequences for these applications. Motivated by this, we propose the Privacy
Aware and Secure Proof Of proximity (PASPORT) to address the problem.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1870
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
Furthermore, in CRNs , malicious users can submit fake locations to the database to access channels that are not available in their
location. In location-based access control applications, attackers can gain unauthorized access to a system or resource by submitting
fake location claims.In activity-tracking applications, insurance companies may offer health insurance plans in which customers are
offered discounts if they have a minimum level of physical activity. This creates an incentive for dishonest users to cheat on their
location data.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1871
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
A. Registration Window
In the REGISTRATION form the user has to fill details like USERNAME, PASSWORD, EMAIL, et
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1872
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
D. Accept as Witness
Here the user is able to accept prover’s request
V. PROPOSED WORK
We propose a privacy preserving verifiable proximity test for L.B.S (Location based services) which enables the user to verify the
correctness of proximity test results from L.B.S servers without revealing their Location information. The Privacy-Aware and
Secure Proof Of proximiTy (PASPORT) scheme in this article to address the problem.Using PASPORT, users submit a location
proof (LP) to service providers to prove that their submitted location is true.PASPORT has a decentralized architecture designed for
ad hoc scenarios in which mobile users can act as witnesses and generate LPs for each other.Furthermore, PASPORT is resilient to
prover– prover collusions and significantly reduces the success probability of Prover– Witness collusion attacks.
Prover
Location Request
Search Products
Give Ratings
End process
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1873
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 11 Issue IV Apr 2023- Available at www.ijraset.com
VIII. RESULT
The proposed scheme has a decentralized architecture suitable for ad hoc applications in which mobile users generate LPs for each
other.
IX. CONCLUSION
This article proposed a secure and privacy-aware scheme for LP generation and verification. The proposed scheme has a
decentralized architecture suitable for ad hoc applications in which mobile users generate LPs for each other. To address terrorist
frauds, we developed a DB protocol PTREAD, that is, a private version of TREAD, and integrated it into PASPORT. Using P-
TREAD, a dishonest prover who established a prover-prover collusion with an adversary can easily be impersonated by the
adversary later. Thus, no logical user takes such a risk by initiating a prover– prover collusion. Furthermore, we employed a witness
selection mechanism to address the prover– witness collusions. Using the proposed mechanism, available witnesses are randomly
assigned to requesting provers by the verifier. This prevents malicious provers from choosing the witnesses themselves.
REFERENCES
[1] P. Asuquo et al., “Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures,”
IEEE Internet Things J., vol. 5, no. 6, pp. 4778–4802, Dec. 2018.
[2] Q. D. Vo and P. De, “A survey of fingerprint-based outdoor localization,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 491–506, 1st Quart., 2016.
[3] R. Gupta and U. P. Rao, “An exploration to location–based service and its privacy preserving techniques: A survey,” Wireless Pers. Commun., vol. 96, no. 2,
pp. 1973–2007, 2017.
[4] Global Location–Based Services Market (2018–2023). Accessed: Jul. 20, 2019. [Online]. Available: https://www.businesswire.com/news/
home/20180927005490/en/Global–Locationbased-Services-Market- 2018-2023-Projected-Grow
[5] Y. Zheng, M. Li, W. Lou, and Y. T. Hou, “Location based handshake and private proximity test with location tags,” IEEE Trans. Depend. Sec. Comput., vol.
14, no. 4, pp. 406–419, Jul./Aug. 2017.
[6] Y. Li, L. Zhou, H. Zhu, and L. Sun, “Privacy–preserving location proof for securing large– scale database–driven cognitive radio networks,” IEEE Internet
Things J., vol. 3, no. 4, pp. 563–571, Aug. 2016.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 1874