SlideShare a Scribd company logo
1 of 25
Seminar on
“A Witness Oriented
Secure Location
Provenance Framework
for Mobile Devices”
WORAL
Presented By :
Aman Kumar
Dept. Of Elect. & Comm. Engg. B.K.I.T., Bhalki
Guided By
Sanjeev Gogga
Contents
 Introduction
 Woral Framework
 Woral Architecture
 Witness Registration
 Implementation
Introduction
 The “WORAL” framework is a complete suite of
production-ready applications, featuring a web-based
service provider, a desktop-based location authority
server, an Android-based user app, a Google Glass-
based client, and a desktop-based auditor.
 The system is based on the Asserted Location Proof
(ALP) protocol.
WORAL Framework
 Terminologies
 Witnesses and Assertions
 Threat Model
 System Model
Terminologies
• The Service Provider SP is the trusted entity
providing the secure location provenance service to
mobile users.
• A User U is an entity who visits a location and uses a
mobile device to request and store location provenance
records.
• A Site S is a physical region with a valid address within
a finite area under the coverage of one location
authority.
• A Location Authority LA is a stationary entity,
certified by the SP.
• A Witness W is a spacio-temporally co- located
mobile user.
• A Witness List WL provides the listing of all
registered witnesses under the coverage of the location
authority at a given time.
Witnesses and Assertions
• A witness is a spatio-temporally co-located entity with
the user and the location authority.
• A witness will assert proofs only when willing to do
so and can de-register as a witness at any time.
• The incentive of the witness can be based on awarded
‘points’ depending on valid assertions.
• The ‘points’ would add to the trust value of a witness
and may be redeemed for membership benefits from
the service provider.
• The assertions may also be used by the witness to
prove co-location with the user.
Threat Model
• The location information within the asserted location
proof corresponds to a particular identity of a user and
an adversary should not be able to create a location
proof for a location that the user has not visited.
• The time at which the particular user visited the given
site and collected the asserted location proof should
not be modifiable by an attacker to create a proof for a
different (local) time than the actual time of visit.
• Users, LA, and witnesses, each own a public/private
key- pair, which has been signed by the SP at the time
the entities register for the service, and no entity
shares their private keys at any point.
Threat Model
• We expect that mobile devices are non-shareable
private properties and the physical security of the
phone depends on the user himself.
• Attacks such as MAC address fingerprinting are
prevented via known techniques such as MAC address
cloning.
• After a proof is collected for a particular site, the user
can delete or tamper with location proof and
provenance records which are saved on the device.
System Model
 We assume that mobile devices carried by users are
capable of communicating with other devices and LAs
over Wi-Fi networks.
 The devices have local storage for storing the
provenance items.
 The user has full access to the storage and
computation of the device, can run an application on
the device, and can delete, modify, or insert any
content in the data stored on the device.
 The LA is a fixed server with higher computation and
storage capability than a mobile device.
 A location runs a Wi-Fi network, and the LA is directly
connected to the network.
 Any user interested to receive an asserted location
provenance record obtains the address of the LA from
the site via network broadcasts.
 Similarly, a user can obtain the address of the location
authority, and register as an interested witness.
 The location authority periodically updates the
available witness list.
 When required, the location authority chooses a
witness from the list at random and sends a request to
the selected witness to assert a location proof.
WORAL ARCHITECTURE
Service Provider
 Account Creation and Authentication: In the
WORAL framework, users, witnesses, LAs, and
auditors need to create an account with the SP using a
unique identification criteria such as the Social
Security Number, passport number, driving license,
trade license, or anything else.
 CryptoID and Key Distribution: The SP is
responsible for providing access to public keys in
different stages of the protocol.
Location Authority
 The user and witness need the IP address of the LA to
establish a TCP connection with the LA.
 They also require the unique location-ID to access
public key of the LA.
 The IP and identifier is made available to the user and
witness through the LA discovery protocol using
broadcast messages
Witness Registration
A WORAL mobile user express his willingness to serve as a witness by sending a
witness registration message WReg to the LA.
W Reg = <CIDw,tw,Sw(CIDw,tw)>
System Overhead for Location Authority
 The LA server was deployed on a dual- core Intel
Q9550 2.83GHz desktop PC with 4GB RAM and
Ubuntu operating system.
Component Architecture
WORAL Service Provider
Entities Services
Admin No registration required (activated via configuration script of web
application), Dashboard, View used/unused service codes, Generate new
service codes, View registered users/location authorities/auditors, View
active inactive location authorities/auditors.
User Registration, Dashboard, View profile settings, View available crypto-IDs,
Enable/Disable witness feature, Change password, Update/Save profile,
Auto-sync with mobile app
Location
Authority
Registration, Dashboard, Profile activation, View profile settings, Profile
Activation, Private-key generated during activation, Download private-
key, Change password
Auditor Registration, Dashboard, Profile activation, View profile settings, Profile
Activation, Change password
The WORAL service provider is a web based application built on the Java Server Pages
(JSP) framework. The service provider has a web-based interface for the service
provider admin, the WORAL users, location authorities, and auditors
WORAL Location Authority
 The LA server is a Java-based application communicating
with the service provider and the user app.
WORAL Users
 The WORAL Android user application is used for both
requesting location proofs as well as for asserting other
users’ location proofs as a witness.
Home Screen Setting
WORAL Users
Proof List Export Proofs
The application is tested on LG Nexus 4, Samsung Galaxy Nexus, Samsung Galaxy
S4, Motorola XT875, HTC 1X, HTC Evo 4G, and Motorola Moto G phones with
Android version 2.3 and higher.
WORAL Auditor
The WORAL auditor is a standalone Java desktop application
communicating with the service provider.
Conclusion
 WORAL, a ready-to-deploy framework for secure, witness-
oriented, and provenance preserving location proofs.
 WORAL allows generating secure and tamper-evident
location provenance items from a given location authority.
 WORAL is based on the Asserted Location Proof protocol,
and is enhanced with provenance preservation based on the
OTIT model.
 The WORAL framework features a web-based service
provider, desktop-based location authority server, an
Android-based user application including a Google Glass
client for the mobile app, and an auditor application for
location provenance validation.
Thank
U
All..
....
Any

More Related Content

What's hot

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
Hai Nguyen
 
High Level Contact Centre Technology Structure
High Level Contact Centre Technology StructureHigh Level Contact Centre Technology Structure
High Level Contact Centre Technology Structure
Chris Vale
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
Nick Owen
 

What's hot (15)

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
TrustBearer - Virginia Security Summit - Web Authentication Strategies - Apri...
 
App Authentication
App AuthenticationApp Authentication
App Authentication
 
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
Using Geographical Location as an Authentication Factor to Enhance mCommerce ...
 
2
22
2
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
High Level Contact Centre Technology Structure
High Level Contact Centre Technology StructureHigh Level Contact Centre Technology Structure
High Level Contact Centre Technology Structure
 
SAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID ConnectSAML VS OAuth 2.0 VS OpenID Connect
SAML VS OAuth 2.0 VS OpenID Connect
 
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User Authentication
 
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Going beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much moreGoing beyond MFA(Multi-factor authentication)-Future demands much more
Going beyond MFA(Multi-factor authentication)-Future demands much more
 

Viewers also liked

wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
Eisha Madhwal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
rajatmal4
 

Viewers also liked (12)

Woral seminar report
Woral seminar reportWoral seminar report
Woral seminar report
 
Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...Secure binary image steganography based on minimizing the distortion on the t...
Secure binary image steganography based on minimizing the distortion on the t...
 
Aman PPT
Aman PPTAman PPT
Aman PPT
 
Projeck work presentation
Projeck work presentationProjeck work presentation
Projeck work presentation
 
WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORK
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
google glass
google glassgoogle glass
google glass
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)
 
Google glass ppt
Google glass pptGoogle glass ppt
Google glass ppt
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 

Similar to Woral

1000 ways to die in mobile oauth
1000 ways to die in mobile oauth1000 ways to die in mobile oauth
1000 ways to die in mobile oauth
Priyanka Aash
 

Similar to Woral (20)

Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508Towards Self Sovereign Identity 20180508
Towards Self Sovereign Identity 20180508
 
Identity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoTIdentity for IoT: An Authentication Framework for the IoT
Identity for IoT: An Authentication Framework for the IoT
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
 
1000 ways to die in mobile oauth
1000 ways to die in mobile oauth1000 ways to die in mobile oauth
1000 ways to die in mobile oauth
 
UMA for ACE
UMA for ACEUMA for ACE
UMA for ACE
 
Access management
Access managementAccess management
Access management
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
TMCnet final
TMCnet finalTMCnet final
TMCnet final
 
Mobile Cloud Identity
Mobile Cloud IdentityMobile Cloud Identity
Mobile Cloud Identity
 
FIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology LandscapeFIDO & Strong Authentication Technology Landscape
FIDO & Strong Authentication Technology Landscape
 
Securing APIs with oAuth2
Securing APIs with oAuth2Securing APIs with oAuth2
Securing APIs with oAuth2
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
Distributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdfDistributed Authorization with Open Policy Agent.pdf
Distributed Authorization with Open Policy Agent.pdf
 
Authentication and Authorization in MERN Stack Applications.pptx
Authentication and Authorization in MERN Stack Applications.pptxAuthentication and Authorization in MERN Stack Applications.pptx
Authentication and Authorization in MERN Stack Applications.pptx
 
Authentication and Authorization in MERN Stack Applications.pptx
Authentication and Authorization in MERN Stack Applications.pptxAuthentication and Authorization in MERN Stack Applications.pptx
Authentication and Authorization in MERN Stack Applications.pptx
 
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
apidays Helsinki & North 2023 - API authorization with Open Policy Agent, And...
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Woral

  • 1. Seminar on “A Witness Oriented Secure Location Provenance Framework for Mobile Devices” WORAL Presented By : Aman Kumar Dept. Of Elect. & Comm. Engg. B.K.I.T., Bhalki Guided By Sanjeev Gogga
  • 2. Contents  Introduction  Woral Framework  Woral Architecture  Witness Registration  Implementation
  • 3. Introduction  The “WORAL” framework is a complete suite of production-ready applications, featuring a web-based service provider, a desktop-based location authority server, an Android-based user app, a Google Glass- based client, and a desktop-based auditor.  The system is based on the Asserted Location Proof (ALP) protocol.
  • 4. WORAL Framework  Terminologies  Witnesses and Assertions  Threat Model  System Model Terminologies • The Service Provider SP is the trusted entity providing the secure location provenance service to mobile users. • A User U is an entity who visits a location and uses a mobile device to request and store location provenance records.
  • 5. • A Site S is a physical region with a valid address within a finite area under the coverage of one location authority. • A Location Authority LA is a stationary entity, certified by the SP. • A Witness W is a spacio-temporally co- located mobile user. • A Witness List WL provides the listing of all registered witnesses under the coverage of the location authority at a given time.
  • 6. Witnesses and Assertions • A witness is a spatio-temporally co-located entity with the user and the location authority. • A witness will assert proofs only when willing to do so and can de-register as a witness at any time. • The incentive of the witness can be based on awarded ‘points’ depending on valid assertions. • The ‘points’ would add to the trust value of a witness and may be redeemed for membership benefits from the service provider. • The assertions may also be used by the witness to prove co-location with the user.
  • 7.
  • 8. Threat Model • The location information within the asserted location proof corresponds to a particular identity of a user and an adversary should not be able to create a location proof for a location that the user has not visited. • The time at which the particular user visited the given site and collected the asserted location proof should not be modifiable by an attacker to create a proof for a different (local) time than the actual time of visit. • Users, LA, and witnesses, each own a public/private key- pair, which has been signed by the SP at the time the entities register for the service, and no entity shares their private keys at any point.
  • 9. Threat Model • We expect that mobile devices are non-shareable private properties and the physical security of the phone depends on the user himself. • Attacks such as MAC address fingerprinting are prevented via known techniques such as MAC address cloning. • After a proof is collected for a particular site, the user can delete or tamper with location proof and provenance records which are saved on the device.
  • 10. System Model  We assume that mobile devices carried by users are capable of communicating with other devices and LAs over Wi-Fi networks.  The devices have local storage for storing the provenance items.  The user has full access to the storage and computation of the device, can run an application on the device, and can delete, modify, or insert any content in the data stored on the device.  The LA is a fixed server with higher computation and storage capability than a mobile device.
  • 11.  A location runs a Wi-Fi network, and the LA is directly connected to the network.  Any user interested to receive an asserted location provenance record obtains the address of the LA from the site via network broadcasts.  Similarly, a user can obtain the address of the location authority, and register as an interested witness.  The location authority periodically updates the available witness list.  When required, the location authority chooses a witness from the list at random and sends a request to the selected witness to assert a location proof.
  • 13. Service Provider  Account Creation and Authentication: In the WORAL framework, users, witnesses, LAs, and auditors need to create an account with the SP using a unique identification criteria such as the Social Security Number, passport number, driving license, trade license, or anything else.  CryptoID and Key Distribution: The SP is responsible for providing access to public keys in different stages of the protocol.
  • 14. Location Authority  The user and witness need the IP address of the LA to establish a TCP connection with the LA.  They also require the unique location-ID to access public key of the LA.  The IP and identifier is made available to the user and witness through the LA discovery protocol using broadcast messages
  • 15. Witness Registration A WORAL mobile user express his willingness to serve as a witness by sending a witness registration message WReg to the LA. W Reg = <CIDw,tw,Sw(CIDw,tw)>
  • 16. System Overhead for Location Authority  The LA server was deployed on a dual- core Intel Q9550 2.83GHz desktop PC with 4GB RAM and Ubuntu operating system.
  • 18. WORAL Service Provider Entities Services Admin No registration required (activated via configuration script of web application), Dashboard, View used/unused service codes, Generate new service codes, View registered users/location authorities/auditors, View active inactive location authorities/auditors. User Registration, Dashboard, View profile settings, View available crypto-IDs, Enable/Disable witness feature, Change password, Update/Save profile, Auto-sync with mobile app Location Authority Registration, Dashboard, Profile activation, View profile settings, Profile Activation, Private-key generated during activation, Download private- key, Change password Auditor Registration, Dashboard, Profile activation, View profile settings, Profile Activation, Change password The WORAL service provider is a web based application built on the Java Server Pages (JSP) framework. The service provider has a web-based interface for the service provider admin, the WORAL users, location authorities, and auditors
  • 19. WORAL Location Authority  The LA server is a Java-based application communicating with the service provider and the user app.
  • 20. WORAL Users  The WORAL Android user application is used for both requesting location proofs as well as for asserting other users’ location proofs as a witness. Home Screen Setting
  • 21. WORAL Users Proof List Export Proofs The application is tested on LG Nexus 4, Samsung Galaxy Nexus, Samsung Galaxy S4, Motorola XT875, HTC 1X, HTC Evo 4G, and Motorola Moto G phones with Android version 2.3 and higher.
  • 22. WORAL Auditor The WORAL auditor is a standalone Java desktop application communicating with the service provider.
  • 23. Conclusion  WORAL, a ready-to-deploy framework for secure, witness- oriented, and provenance preserving location proofs.  WORAL allows generating secure and tamper-evident location provenance items from a given location authority.  WORAL is based on the Asserted Location Proof protocol, and is enhanced with provenance preservation based on the OTIT model.  The WORAL framework features a web-based service provider, desktop-based location authority server, an Android-based user application including a Google Glass client for the mobile app, and an auditor application for location provenance validation.

Editor's Notes

  1. Dept. Of Electronics and Communication. Engg.
  2. Conclusion
  3. Conclusion
  4. Any