A Secure Location-Based Coupon Redeeming System

With the rapid evolution of mobile computing technologies, Mobile location based services are identified as one of the most promising target application. Mobile location based services have lot of limiting factors. In this paper we propose a new rewarding system based on location of the Mobile User where Mobile Units will collect Coupons from the Coupon Distribution Center and then redeem their Coupon’s at the Coupon Collection Center. Coupons acts as virtual currency Coupon’s Distributers and Collectors can be any entity or retailer. This rewarding system based on location of the Mobile Unit is a secure one and preserves privacy of the Mobile user.

[1]  Ernesto Damiani,et al.  Map-Based Location and Tracking in Multipath Outdoor Mobile Networks , 2011, IEEE Transactions on Wireless Communications.

[2]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[3]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[4]  Margaret Martonosi,et al.  Location-based trust for mobile user-generated content: applications, challenges and implementations , 2008, HotMobile '08.

[5]  Salvatore Loreto,et al.  Service broker architecture: Location business case and mashups , 2009, IEEE Communications Magazine.

[6]  Ling Liu,et al.  Location Privacy in Mobile Systems: A Personalized Anonymization Model , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[7]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[8]  Alec Wolman,et al.  Enabling new mobile applications with location proofs , 2009, HotMobile '09.

[9]  Sushil Jajodia,et al.  Providing Mobile Users' Anonymity in Hybrid Networks , 2010, ESORICS.

[10]  Kyriakos Mouratidis,et al.  Preventing Location-Based Identity Inference in Anonymous Spatial Queries , 2007, IEEE Transactions on Knowledge and Data Engineering.

[11]  Wei Guo,et al.  Signal Processing Techniques in Network- Aided Positioning , 2005 .

[12]  Guohong Cao,et al.  Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System , 2013, IEEE Transactions on Mobile Computing.

[13]  Tetsuji Satoh,et al.  An anonymous communication technique using dummies for location-based services , 2005, ICPS '05. Proceedings. International Conference on Pervasive Services, 2005..

[14]  Urs Hengartner,et al.  VeriPlace: a privacy-aware location proof architecture , 2010, GIS '10.

[15]  Marco Gruteser,et al.  USENIX Association , 1992 .

[16]  K.J.R. Liu,et al.  Signal processing techniques in network-aided positioning: a survey of state-of-the-art positioning designs , 2005, IEEE Signal Processing Magazine.