Research Article
BibTex RIS Cite

Kısa Mesafe Kablosuz İletişim ve Açık Anahtarlı Kriptografi ile Doğrulanmış Konum Bildirimi

Year 2019, Volume: 7 Issue: 1, 90 - 101, 31.01.2019
https://doi.org/10.29130/dubited.427932

Abstract

Bu makalede, yaşadıkları şehrin ve özellikle yaşadıkları ülkenin dışında başka bir yere giden kişilerin, gerçekten
bu yerde olduklarının doğrulanarak istenen kişilere bildirim yapılabilmesi için bir cihaz ve bu cihaza dayalı
yöntemler önerilmektedir. Önerilen cihaz, kayıtlı sabit noktalara yerleştirilir ve kişisel mobil aygıtlar ile yalnızca
kısa mesafe kablosuz ağda haberleşir. İnsanların, mobil aygıtlarını çoğu zaman, seyahate çıktıklarındaysa hemen
her zaman, yanlarında bulundurdukları varsayımıyla, bir mobil aygıtın konumu bilinen sabit bir cihazın
yakınında olduğunun doğrulanması, o aygıta sahip kişinin de o kayıtlı konumda olduğu anlamına gelmektedir.
Kısa mesafe kablosuz ağ iletişiminde kullanılan verilerin açık anahtarlı kriptografi (AAK) ile şifrelenmesiyle, o
yerel ağda bulunulduğu ispatlanabilir hale getirilmekte ve böylece ilgili kişinin belli bir zaman için belli bir
konumda olup olmadığının doğrulanması mümkün kılınmaktadır.

References

  • [1] B. R. Waters and E. W. Felten, “Secure, Private Proofs of Location,” Princeton University, ABD, Rap. TR-667-03, 2002.
  • [2] N. Sastry, U. Shankar and D. Wagner, “Secure Verification of Location Claims,” 2. ACM Workshop on Wireless Security, San Diego, ABD, 2003, pp. 1–10.
  • [3] S. Capkun, et al., “Secure Location Verification with Hidden and Mobile Base Stations,” IEEE Transactions on Mobile Computing, vol. 7, no. 4, pp. 470–483, 2008.
  • [4] S. Saroiu and A. Wolman, “Enabling New Mobile Applications with Location Proofs,” 10. Workshop on Mobile Computing Systems and Applications, Santa Cruz, ABD, 2009, pp. 3.1–3.6.
  • [5] S. Saroiu and A. Wolman, “I am a sensor, and I approve this message,” 11. Workshop on Mobile Computing Systems & Applications, New York, ABD, 2010, pp. 37–42.
  • [6] W. Luo and U. Hengartner, “VeriPlace: A privacy-aware location proof architecture,” 18. SIGSPATIAL International Conference on Advances in Geographic Information Systems, New York, ABD, 2010, pp. 23–32.
  • [7] X. Wang, J. Zhu and A. Pande, “STAMP: Ad hoc spatial-temporal provenance assurance for mobile users,” 21. IEEE International Conference on Network Protocols, Göttingen, Almanya, 2013, pp. 1–10.
  • [8] M. Liu, et al., “Privacy-preserving distributed location proof generating system,” China Communications, vol. 13, no. 3, pp. 203–218, 2016.
  • [9] Z. Zhu and G. Cao, “Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System,” IEEE Transactions on Mobile Computing, vol. 12, no. 1, pp. 51–64, 2013.
  • [10] M. Miettinen, et al., “I Know Where You are: Proofs of Presence Resilient to Malicious Provers,” 10. ACM Symposium on Information, Computer and Communications Security, Singapur, 2015, pp. 567–577.
  • [11] Y. Zhang, et al., “VProof: Lightweight Privacy-Preserving Vehicle Location Proofs,” IEEE Transactions on Vehicular Technology, vol. 64, no. 1, pp. 378–385, 2015.
  • [12] C. Javali, et al., “I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol,” IEEE 41st Conference on Local Computer Networks, Dubai, BAE, 2016, pp. 477– 485.
  • [13] X. Ni, et al., “A mobile phone‐based physical‐social location proof system for mobile social network service,” Security and Communication Networks, vol. 9, no. 13, pp. 1890–1904, 2016.
  • [14] W. Stallings, Cryptography and Network Security: Principles and Practices, 3. ed., New Jersey, ABD: Pearson Education, 2003, ch. 9, pp. 258–278.

Notification of Verified Locations using Short-Range Wireless Communication and Public-Key Cryptography

Year 2019, Volume: 7 Issue: 1, 90 - 101, 31.01.2019
https://doi.org/10.29130/dubited.427932

Abstract

In this paper, we propose a device and methods, based on this device, in order to create notifications about
verified locations of people to other people in their contact lists, when they arrive in another city, and in
particular, in another country other than homeland. The proposed device is stationary at a known and recorded
location, and it communicates with personal mobile devices only in short-range wireless network. With the
assumption that a personal mobile device is with its owner most of the time, and almost always during a trip,
verification that the mobile device is in the vicinity of a stationary device means that its owner is also in that
certain location. Using public-key cryptography in encryption of data in the short-range wireless communication,
it becomes provable to be in that local network, and hence it is possible to verify, whether a particular person
was at a particular location in a particular time.

References

  • [1] B. R. Waters and E. W. Felten, “Secure, Private Proofs of Location,” Princeton University, ABD, Rap. TR-667-03, 2002.
  • [2] N. Sastry, U. Shankar and D. Wagner, “Secure Verification of Location Claims,” 2. ACM Workshop on Wireless Security, San Diego, ABD, 2003, pp. 1–10.
  • [3] S. Capkun, et al., “Secure Location Verification with Hidden and Mobile Base Stations,” IEEE Transactions on Mobile Computing, vol. 7, no. 4, pp. 470–483, 2008.
  • [4] S. Saroiu and A. Wolman, “Enabling New Mobile Applications with Location Proofs,” 10. Workshop on Mobile Computing Systems and Applications, Santa Cruz, ABD, 2009, pp. 3.1–3.6.
  • [5] S. Saroiu and A. Wolman, “I am a sensor, and I approve this message,” 11. Workshop on Mobile Computing Systems & Applications, New York, ABD, 2010, pp. 37–42.
  • [6] W. Luo and U. Hengartner, “VeriPlace: A privacy-aware location proof architecture,” 18. SIGSPATIAL International Conference on Advances in Geographic Information Systems, New York, ABD, 2010, pp. 23–32.
  • [7] X. Wang, J. Zhu and A. Pande, “STAMP: Ad hoc spatial-temporal provenance assurance for mobile users,” 21. IEEE International Conference on Network Protocols, Göttingen, Almanya, 2013, pp. 1–10.
  • [8] M. Liu, et al., “Privacy-preserving distributed location proof generating system,” China Communications, vol. 13, no. 3, pp. 203–218, 2016.
  • [9] Z. Zhu and G. Cao, “Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System,” IEEE Transactions on Mobile Computing, vol. 12, no. 1, pp. 51–64, 2013.
  • [10] M. Miettinen, et al., “I Know Where You are: Proofs of Presence Resilient to Malicious Provers,” 10. ACM Symposium on Information, Computer and Communications Security, Singapur, 2015, pp. 567–577.
  • [11] Y. Zhang, et al., “VProof: Lightweight Privacy-Preserving Vehicle Location Proofs,” IEEE Transactions on Vehicular Technology, vol. 64, no. 1, pp. 378–385, 2015.
  • [12] C. Javali, et al., “I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol,” IEEE 41st Conference on Local Computer Networks, Dubai, BAE, 2016, pp. 477– 485.
  • [13] X. Ni, et al., “A mobile phone‐based physical‐social location proof system for mobile social network service,” Security and Communication Networks, vol. 9, no. 13, pp. 1890–1904, 2016.
  • [14] W. Stallings, Cryptography and Network Security: Principles and Practices, 3. ed., New Jersey, ABD: Pearson Education, 2003, ch. 9, pp. 258–278.
There are 14 citations in total.

Details

Primary Language Turkish
Subjects Engineering
Journal Section Articles
Authors

Ahmet Cezayirli 0000-0001-7003-6621

Publication Date January 31, 2019
Published in Issue Year 2019 Volume: 7 Issue: 1

Cite

APA Cezayirli, A. (2019). Kısa Mesafe Kablosuz İletişim ve Açık Anahtarlı Kriptografi ile Doğrulanmış Konum Bildirimi. Duzce University Journal of Science and Technology, 7(1), 90-101. https://doi.org/10.29130/dubited.427932
AMA Cezayirli A. Kısa Mesafe Kablosuz İletişim ve Açık Anahtarlı Kriptografi ile Doğrulanmış Konum Bildirimi. DUBİTED. January 2019;7(1):90-101. doi:10.29130/dubited.427932
Chicago Cezayirli, Ahmet. “Kısa Mesafe Kablosuz İletişim Ve Açık Anahtarlı Kriptografi Ile Doğrulanmış Konum Bildirimi”. Duzce University Journal of Science and Technology 7, no. 1 (January 2019): 90-101. https://doi.org/10.29130/dubited.427932.
EndNote Cezayirli A (January 1, 2019) Kısa Mesafe Kablosuz İletişim ve Açık Anahtarlı Kriptografi ile Doğrulanmış Konum Bildirimi. Duzce University Journal of Science and Technology 7 1 90–101.
IEEE A. Cezayirli, “Kısa Mesafe Kablosuz İletişim ve Açık Anahtarlı Kriptografi ile Doğrulanmış Konum Bildirimi”, DUBİTED, vol. 7, no. 1, pp. 90–101, 2019, doi: 10.29130/dubited.427932.
ISNAD Cezayirli, Ahmet. “Kısa Mesafe Kablosuz İletişim Ve Açık Anahtarlı Kriptografi Ile Doğrulanmış Konum Bildirimi”. Duzce University Journal of Science and Technology 7/1 (January 2019), 90-101. https://doi.org/10.29130/dubited.427932.
JAMA Cezayirli A. Kısa Mesafe Kablosuz İletişim ve Açık Anahtarlı Kriptografi ile Doğrulanmış Konum Bildirimi. DUBİTED. 2019;7:90–101.
MLA Cezayirli, Ahmet. “Kısa Mesafe Kablosuz İletişim Ve Açık Anahtarlı Kriptografi Ile Doğrulanmış Konum Bildirimi”. Duzce University Journal of Science and Technology, vol. 7, no. 1, 2019, pp. 90-101, doi:10.29130/dubited.427932.
Vancouver Cezayirli A. Kısa Mesafe Kablosuz İletişim ve Açık Anahtarlı Kriptografi ile Doğrulanmış Konum Bildirimi. DUBİTED. 2019;7(1):90-101.