1 / 9

The ProVer System

The ProVer System. A system to provide verified location information. Michelle Graham & David Gray Dublin City University. Why verify locations?. Mobile devices allow communication, any time, anywhere Location Based Services (LBS) enrich this ability

aclay
Download Presentation

The ProVer System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The ProVer System A system to provide verified location information Michelle Graham & David Gray Dublin City University

  2. Why verify locations? • Mobile devices allow communication, any time, anywhere • Location Based Services (LBS) enrich this ability • LBS have great potential for growth into new areas, but… • Can’t trust self-provided locations • Infrastructure employment is costly & limiting IMUI '09 - 29/10/09

  3. What is ProVer? • Confirms that a device is in a claimed location • Provides a certified proof of location for use with other systems • Abstracts need for location proving functionality away from others • Does not require infrastructure use • Employs neighbouring devices as evidence providers IMUI '09 - 29/10/09

  4. System outline (1) • Three roles • Claimant – device making a claim • Verifier – central authority • Proof Provider – neighbour of Claimant • Assumptions • Wireless capability • Encryption capabilities • Presence of a tamper-resistant module • Access to reasonably accurate clock IMUI '09 - 29/10/09

  5. Initiating the claim • Claimant requests verification • Provides identity and location • Verifier gathers Proof Provider volunteers • Proof Providers selected from volunteer pool • Selection process must guard against manipulation IMUI '09 - 29/10/09

  6. Gathering evidence • Collect evidence of presence in area from select neighbouring devices • Distance bounding proves a device is within range • Protocol employed designed hierarchically to allow for higher or lower levels of security • Evidence is signed by producer to confirm source • Protocol employed has been formally modeled and checked for vulnerabilities IMUI '09 - 29/10/09

  7. Verification process • Assign each verdict a weight based on trustworthiness of the provider • Trust computed using probability expectation formula • Sum up weighted verdicts and compare to scale based on maximum possible value • Scale broken into 3 portions, based on 2 percentage thresholds • “not possible” • “unsure” • “possible” IMUI '09 - 29/10/09

  8. Future work • Conduct complete system simulation • Investigate impact of heavy traffic on distance bounding • Investigate new method of verification IMUI '09 - 29/10/09

  9. Conclusions • ProVer provides method of verifying location without infrastructure • Capitalizes on increasingly ubiquitous mobile networking devices • Employs a secure protocol to protect the privacy of devices involved in a claim • Provides a generically formatted, timestamped, proof of location which can be employed with any other system IMUI '09 - 29/10/09

More Related