%0 Conference Proceedings %T Who, When, and Where? Location Proof Assertion for Mobile Devices %+ University of Alabama at Birmingham [ Birmingham] (UAB) %A Khan, Rasib %A Zawoad, Shams %A Haque, Md, Munirul %A Hasan, Ragib %< avec comité de lecture %( Lecture Notes in Computer Science %B 28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) %C Vienna, Austria %Y David Hutchison %Y Takeo Kanade %Y Bernhard Steffen %Y Demetri Terzopoulos %Y Doug Tygar %Y Gerhard Weikum %Y Vijay Atluri %Y Günther Pernul %Y Josef Kittler %Y Jon M. Kleinberg %Y Alfred Kobsa %Y Friedemann Mattern %Y John C. Mitchell %Y Moni Naor %Y Oscar Nierstrasz %Y C. Pandu Rangan %I Springer %3 Data and Applications Security and Privacy XXVIII %V LNCS-8566 %P 146-162 %8 2014-07-14 %D 2014 %R 10.1007/978-3-662-43936-4_10 %K Location Assertion %K Location Proof %K Proof Protocol %K Security %K Witness Endorsement %Z Computer Science [cs]Conference papers %X In recent years, location of mobile devices has become an important factor. Mobile device users can easily access various customized applications from the service providers based on the current physical location information. Nonetheless, it is a significant challenge in distributed architectures for users to prove their presence at a particular location in a privacy-protected and secured manner. So far, researchers have proposed multiple schemes to implement a secure location proof collection mechanism. However, such location proof schemes are subject to tampering and not resistant to collusion attacks. Additionally, the location authority providing a location proof is assumed to be honest at all times. In this paper, we present the fundamental requirements of any location proof generation scheme, and illustrate the potential attacks possible in such non-federated environments. Based on our observations, we introduce a concept of witness oriented endorsements, and describe a collusion-resistant protocol for asserted location proofs.We provide an exhaustive security analysis of the proposed architecture, based on all possible collusion models among the user, location authority, and witness. We also present a prototype implementation and extensive experimental results to adjust different threshold values and illustrate the feasibility of deploying the protocol in regular devices for practical use. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01285030/document %2 https://inria.hal.science/hal-01285030/file/978-3-662-43936-4_10_Chapter.pdf %L hal-01285030 %U https://inria.hal.science/hal-01285030 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-LNCS-8566 %~ IFIP-WG11-3