Accession Number : ADA621993


Title :   Secure Location Provenance for Mobile Devices


Descriptive Note : Final rept. Aug 2012-Feb 2015


Corporate Author : ALABAMA UNIV IN BIRMINGHAM


Personal Author(s) : Hasan, Ragib ; Khan, Rasib ; Zawoad, Shams ; Haque, Munirul


Full Text : http://www.dtic.mil/get-tr-doc/pdf?AD=ADA621993


Report Date : Jul 2015


Pagination or Media Count : 26


Abstract : Location based services allow mobile device users to access various services based on the users current physical location information. Path - critical applications, such as supply chain verification, require a chronological ordering of location proofs. It is a significant challenge in distributed and user - centric architectures for users to prove their presence and the path of travel in a privacy - protected and secure manner. So far, proposed schemes for secure location proofs are mostly subject to tampering, not resistant to collusion attacks, do not offer preservation of the provenance, and are not flexible enough for users to prove their provenance of location proofs. In this project, we focused our research on secure location provenance techniques for mobile devices. We created WORAL, a complete ready - to - deploy framework for generating and validating witness oriented asserted location provenance records. The WORAL framework is based a secure asserted location proof protocol and location provenance preservation methods for generating secure location provenance chains on mobile devices. WORAL allows user - centric, collusion resistant, tamper - evident, privacy protected, verifiable, and provenance preserving location proofs for mobile devices. The report presents the schematic development, experiments and results, and implementation of WORAL for Android device users including a w e arable device based client for enhanced usability.


Descriptors :   *COMPUTER NETWORK SECURITY , *CRYPTOGRAPHY , *GLOBAL POSITIONING SYSTEM , *MOBILE COMPUTING , *POSITION(LOCATION) , COMMUNICATIONS PROTOCOLS , DATA TRANSMISSION SECURITY , DISTRIBUTED COMPUTING , GRIDS(COORDINATES) , HACKING(COMPUTER SECURITY) , MESSAGE PROCESSING , NETWORK ARCHITECTURE , OPERATING SYSTEMS(COMPUTERS) , PATHS , SYSTEMS ENGINEERING , THREATS , USER NEEDS , VERIFICATION


Subject Categories : Computer Programming and Software
      Computer Systems Management and Standards
      Cybernetics
      Direction Finding
      Radio Communications


Distribution Statement : APPROVED FOR PUBLIC RELEASE