{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:12:48Z","timestamp":1740136368153,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T00:00:00Z","timestamp":1557273600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T00:00:00Z","timestamp":1557273600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s00779-019-01220-5","type":"journal-article","created":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T11:14:26Z","timestamp":1557314066000},"page":"551-569","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Anchor of trust: towards collusion-resistant trusted indoor location for enterprise and industrial use"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3878-5208","authenticated-orcid":false,"given":"Jacob T.","family":"Biehl","sequence":"first","affiliation":[]},{"given":"Adam J.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Gerry","family":"Filby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,8]]},"reference":[{"key":"1220_CR1","unstructured":"Are estimote beacons secure? How does secure UUID work? \nhttps:\/\/community.estimote.com\/hc\/en-us\/articles\/201371053\n\n. Accessed 24 Oct 2017"},{"key":"1220_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6584-9","volume-title":"A practical guide to TPM 2.0: using the trusted platform module in the new age of security","author":"W Arthur","year":"2015","unstructured":"Arthur W, Challener D (2015) A practical guide to TPM 2.0: using the trusted platform module in the new age of security. Apress, New York"},{"issue":"2000","key":"1220_CR3","first-page":"775","volume":"2","author":"P Bahl","year":"2000","unstructured":"Bahl P, Padmanabhan VN (2000) RADAR: an in-building RF-based user location and tracking system. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOMM \u201800). Proceedings IEEE 2(2000):775\u2013784","journal-title":"Proceedings IEEE"},{"key":"1220_CR4","doi-asserted-by":"publisher","unstructured":"Biehl JT, Cooper M, Filby G, Kratz S (2014) LoCo: a ready-to-deploy framework for efficient room localization using Wi-Fi, Proceedings of the 2014 ACM international joint conference on pervasive and ubiquitous computing. Seattle, Washington. \nhttps:\/\/doi.org\/10.1145\/2632048.2636083","DOI":"10.1145\/2632048.2636083"},{"key":"1220_CR5","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1145\/2750858.2804284","volume-title":"You\u2019re where? prove it!: towards trusted indoor location estimation of mobile devices. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15)","author":"JT Biehl","year":"2015","unstructured":"Biehl JT, Lee AJ, Filby G, Cooper M (2015) You\u2019re where? prove it!: towards trusted indoor location estimation of mobile devices. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). ACM, New York, pp 909\u2013919. \nhttps:\/\/doi.org\/10.1145\/2750858.2804284"},{"key":"1220_CR6","doi-asserted-by":"publisher","unstructured":"Bolliger P (2008) Redpin - adaptive, zero-configuration indoor localization through user collaboration, Proceedings of the first ACM international workshop on Mobile entity localization and tracking in GPS-less environments, San Francisco, California, USA. \nhttps:\/\/doi.org\/10.1145\/1410012.1410025","DOI":"10.1145\/1410012.1410025"},{"key":"1220_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_26","volume-title":"The shy mayor: private badges in GeoSocial networks. Applied Cryptography and Network Security. Lecture notes in computer science, 7341","author":"B Carbunar","year":"2012","unstructured":"Carbunar B, Sion R, Potharaju R, Ehsa M (2012) The shy mayor: private badges in GeoSocial networks. Applied Cryptography and Network Security. Lecture notes in computer science, 7341. Springer, Berlin. \nhttps:\/\/doi.org\/10.1007\/978-3-642-31284-7_26"},{"key":"1220_CR8","doi-asserted-by":"publisher","unstructured":"Fan M, Liu Q, Tang H, Chiu P (2014) HiFi: hide and find digital content associated with physical objects via coded light. Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 1-6, Santa Barbara, California. \nhttps:\/\/doi.org\/10.1145\/2565585.2565587","DOI":"10.1145\/2565585.2565587"},{"key":"1220_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaCom.2013.6694657","volume-title":"Indoor localization and tracking using posterior state distribution of hidden Markov model. Proceedings of the 8th International ICST Conference on Communications and Networking in China (CHINACOM \u201813)","author":"RA El-Khoribi","year":"2013","unstructured":"El-Khoribi RA, Hamza HS, Hammad MA (2013) Indoor localization and tracking using posterior state distribution of hidden Markov model. Proceedings of the 8th International ICST Conference on Communications and Networking in China (CHINACOM \u201813). IEEE, Guilin. \nhttps:\/\/doi.org\/10.1109\/ChinaCom.2013.6694657"},{"issue":"2\/3 (March\u2013May","key":"1220_CR10","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1023\/A:1013767926256","volume":"8","author":"A Harter","year":"2002","unstructured":"Harter A, Hopper A, Steggles P, Ward A, Webster P (2002) The anatomy of a context-aware application. Wirel Netw 8(2\/3 (March\u2013May 2002)):187\u2013197. \nhttps:\/\/doi.org\/10.1023\/A:1013767926256","journal-title":"Wirel Netw"},{"key":"1220_CR11","volume-title":"SpotON: an indoor 3D location sensing technology based on RF signal strength, Tech. Rep. UW CSE 00\u201302-02","author":"J Hightower","year":"2000","unstructured":"Hightower J, Want R, Borriello G (2000) SpotON: an indoor 3D location sensing technology based on RF signal strength, Tech. Rep. UW CSE 00\u201302-02. University of Washington, Department of Computer Science and Engineering, Seattle"},{"key":"1220_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219","volume-title":"Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM \u201803)","author":"Y-C Hu","year":"2003","unstructured":"Hu Y-C, Perrig A, Johnson DB (2003) Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM \u201803). IEEE, San Francisco. \nhttps:\/\/doi.org\/10.1109\/INFCOM.2003.1209219"},{"key":"1220_CR13","unstructured":"iBeacon for Developers. \nhttps:\/\/developer.apple.com\/ibeacon\/\n\n. Accessed 24 Oct 2017"},{"key":"1220_CR14","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/s10776-013-0211-y","volume":"20","author":"Y Inatomi","year":"2013","unstructured":"Inatomi Y, Hong J, Ohtsuki T (2013) Hidden Markov model based localization using array antenna. Int J Wireless Inf Networks 20:246\u2013255. \nhttps:\/\/doi.org\/10.1007\/s10776-013-0211-y","journal-title":"Int J Wireless Inf Networks"},{"key":"1220_CR15","unstructured":"Kontakt.io Beacon Security. \nhttps:\/\/kontakt.io\/products-and-solutions\/complete-beacon-security\/\n\n. Accessed 24 Oct 2017"},{"key":"1220_CR16","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1734583.1734586","volume-title":"Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile '10)","author":"W Luo","year":"2010","unstructured":"Luo W, Hengartner U (2010) Proving your location without giving up your privacy. In: Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile '10). ACM, New York, pp 7\u201312. \nhttps:\/\/doi.org\/10.1145\/1734583.1734586"},{"key":"1220_CR17","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1145\/1653662.1653692","volume-title":"Proceedings of the 16th ACM conference on Computer and communications security (CCS '09)","author":"J Manweiler","year":"2009","unstructured":"Manweiler J, Scudellari R, Cox LP (2009) SMILE: encounter-based trust for mobile social services. In: Proceedings of the 16th ACM conference on Computer and communications security (CCS '09). ACM, New York, pp 246\u2013255. \nhttps:\/\/doi.org\/10.1145\/1653662.1653692"},{"issue":"1 (January 2008","key":"1220_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s00779-006-0124-1","volume":"12","author":"T Moors","year":"2008","unstructured":"Moors T, Mei M, Salim A (2008) Using short-range communication to control mobile device functionality. Pers Ubiquit Comput 12(1 (January 2008)):11\u201318. \nhttps:\/\/doi.org\/10.1007\/s00779-006-0124-1","journal-title":"Pers Ubiquit Comput"},{"key":"1220_CR19","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2523649.2523653","volume-title":"Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC '13)","author":"I Polakis","year":"2013","unstructured":"Polakis I, Volanis S, Athanasopoulos E, Markatos EP (2013) The man who was there: validating check-ins in location-based services. In: Proceedings of the 29th Annual Computer Security Applications Conference (ACSAC '13). ACM, New York, pp 19\u201328. \nhttps:\/\/doi.org\/10.1145\/2523649.2523653"},{"key":"1220_CR20","doi-asserted-by":"publisher","unstructured":"Portnoi M, Shen C-C (2015) Loc-auth: location-enabled authentication through attribute-based encryption. In: International Conference on Computing, Networking and Communications (ICNC 2015). \nhttps:\/\/doi.org\/10.1109\/ICCNC.2015.7069321","DOI":"10.1109\/ICCNC.2015.7069321"},{"key":"1220_CR21","doi-asserted-by":"publisher","unstructured":"Saroiu S, Wolman A (2009) Enabling new mobile applications with location proofs, Proceedings of the 10th workshop on Mobile Computing Systems and Applications, 1-6. Santa Cruz, California. \nhttps:\/\/doi.org\/10.1145\/1514411.1514414","DOI":"10.1145\/1514411.1514414"},{"key":"1220_CR22","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1145\/2971648.2971685","volume-title":"Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '16)","author":"D Yang","year":"2016","unstructured":"Yang D, Zhang D, Qu B, Cudr\u00e9-Mauroux P (2016) PrivCheck: privacy-preserving check-in data publishing for personalized location based services. In: Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '16). ACM, New York, pp 545\u2013556. \nhttps:\/\/doi.org\/10.1145\/2971648.2971685"},{"key":"1220_CR23","unstructured":"Whisper Mode. Application Note. \nhttps:\/\/assets.lairdtech.com\/home\/brandworld\/files\/Application%20Note%20-%20BL600%20Whisper%20Mode.pdf\n\n. Accessed 24 Oct 2017"},{"key":"1220_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/SICE.2006.315151","volume-title":"Localization of mobile robot using particle filter. In: Proceedings of the SICE-ICASE International Joint Conference","author":"J Woo","year":"2006","unstructured":"Woo J, Kim Y-j, Lee J-o, Lim M-t (2006) Localization of mobile robot using particle filter. In: Proceedings of the SICE-ICASE International Joint Conference. IEEE, Busan. \nhttps:\/\/doi.org\/10.1109\/SICE.2006.315151"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01220-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-019-01220-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01220-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,16]],"date-time":"2020-09-16T09:55:37Z","timestamp":1600250137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-019-01220-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,8]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["1220"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01220-5","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2019,5,8]]},"assertion":[{"value":"24 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}