Journal on Communications ›› 2022, Vol. 43 ›› Issue (9): 121-133.doi: 10.11959/j.issn.1000-436x.2022173

• Papers • Previous Articles     Next Articles

Cooperation-based location authentication scheme for crowdsensing applications

Youliang TIAN1,2,3, Maoqing TIAN1,2, Hongfeng GAO2, Miao HE4, Jinbo XIONG1,2,5   

  1. 1 State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China
    2 College of Computer Science and Technology, Guizhou University, Guiyang 550025, China
    3 Institute of Cryptography &Data Security, Guizhou University, Guiyang 550025, China
    4 College of Electrical and Computer Engineering, Queen’s University, Kingston ON K7L 3N6, Canada
    5 College of Computer and Cyber Security, Fujian Normal University, Fuzhou 350117, China
  • Revised:2022-07-15 Online:2022-09-25 Published:2022-09-01
  • Supported by:
    The National Key Research and Development Program of China(2021YFB3101100);The National Natural Science Foundation of China(U1836205);Project of High-Level Innovative Talents of Guizhou Province([2020]6008);Science and Technology Program of Guiyang([2021]1-5);Science and Technology Program of Guiyang([2022]2-4);Science and Technology Program of Guizhou Province([2020]5017);Science and Technology Program of Guizhou Province([2022]065)


Utilizing mobile devices to collect location-related data in crowdsensing has the security problem of a location cheating attack.How to guarantee the quality of these sensitive data has become a challenge.In response to this, a location authentication scheme was proposed based on cooperation to detect malicious users who submit false locations.Firstly, users with mobile devices were used to generate location proofs for each other, and a location verification scheme was designed based on distance bounding protocols for obtaining new information by multiple collisions of the same random number, which ensured the user’s location should be unforgeable and achieved the purpose of improving the quality of collected data.In addition, a location proof cooperator select method based on region division and reputation model was proposed which effectively prevented collusion attack and solved the problem of concentration of equity.Meanwhile, the incentive mechanism based on reputation value and task completion time was designed to effectively improve the location proof cooperator efficiency of task completion.Finally, security analysis and performance evaluation indicate that the scheme has proved to be correctness and secure, and the advantages in computational cost and communication overhead.

Key words: distance-bounding protocol, location authentication, crowdsensing, collusion attack, reputation incentive

CLC Number: 

No Suggested Reading articles found!