A Taxonomy and Methodology for Proof-of-Location Systems
By: Eduardo Brito , Fernando Castillo , Liina Kamm and more
Potential Business Impact:
Proves you were really there, safely.
Digital societies increasingly rely on trustworthy proofs of physical presence for services such as supply-chain tracking, e-voting, ride-sharing, and location-based rewards. Yet, traditional localization methods often lack cryptographic guarantees of where and when an entity was present, leaving them vulnerable to spoofing, replay, or collusion attacks. In response, research on Proof-of-Location (PoL) has emerged, with recent approaches combining distance bounding, distributed consensus, and privacy-enhancing techniques to enable verifiable, tamper-resistant location claims. As the design space for PoL systems grows in complexity, this paper provides a unified framework to help practitioners navigate diverse application needs. We first propose a taxonomy identifying four core domains: (1) cryptographic guarantees, (2) spatio-temporal synchronization, (3) trust and witness models, and (4) interaction and overhead. Building on this, we introduce a methodology to map application-specific requirements onto appropriate PoL architectures. We illustrate this process through three use cases (retail e-coupons, supply chain auditing, and physical e-voting), each showing how different constraints shape protocol choices. Overall, this work offers a structured approach to building secure, scalable, and interoperable PoL systems.
Similar Papers
GPoS: Geospatially-aware Proof of Stake
Distributed, Parallel, and Cluster Computing
Makes blockchain networks more spread out globally.
Privacy-preserving and reward-based mechanisms of proof of engagement
Cryptography and Security
Lets you prove you did something online.
On Spatial-Provenance Recovery in Wireless Networks with Relaxed-Privacy Constraints
Cryptography and Security
Cars share safe, partial locations for services.