Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Payment Systems for Distributed Transport Scheme .. Lars Fischer Universität Siegen
September 23, 2014
Lars Fischer
1/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Outline
Introduction Related Work Advance Payment Process Distance Measure Discussion Conclusion .
Lars Fischer
2/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Introduction Physical Objects Sneaker Transport
▶
Co-Presence Networks
▶
Payment for Transportation Effort Factors
▶
▶ ▶ ▶
▶
Challenges: ▶ ▶
Lars Fischer
Time Object Size/Weight here: Distance Fair Transport Distance Measure Secure Payment
.
3/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
P.O.S.T.-Application
Lars Fischer
4/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Transport Path e5 e4 e1
a5
a6 d
a1
a2 e2
. s → → − − → + ··· + − se en d ≥ sd 1 Lars Fischer
a4
a3 e3
5/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Requirements for Fair Transport Distance R 1) Predictable/fixed price of transportation ▶
p(s, d) ∼ δ(s, d)
R 2) Fair division of work done ▶ ▶ ▶
i) p(ai ) ∼ p(s, d) × ∑δ(a δ(aj ) No negative distance don’t pay for work Overshooting of destination (passing it closely)
R 3) Tamper-proof Evidence of Distance Travelled ▶ ▶
Prevent detouring Misplacement of last position
R 4) Prevent malicious collaboration R 5) Payment after the object reached its destination or on the spot?
Lars Fischer
6/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Related Concepts
▶ ▶ ▶ ▶
Lars Fischer
Proof-of-Work (Adam Back: HashCash [1]) Fair division Line-of-Sound-Verification: [3] Position-Based Cryptography [2]
7/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Advance Payment Process 1. advance payment s −→ d 2. connect payment to packet securely (voucher) 3. pay back delivery an −→ an−1 s .
pa2
pa1
ps a1
e1
a2
e2
pa3 a3
e3
pa4 a4
d
psd [Narrative-Style Contact Graph (see http://xkcd.com/657/)]
Lars Fischer
8/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Voucher Requirements ▶ Prove that payment happened ▶ ▶
▶
Lars Fischer
Prove relation payment to packet Prevent double-spending (same voucher for multiple packets) Partial reimbursement
9/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Bitcoin for Vouchers ▶ ▶ ▶
Transaction is public Reference packet id Utilise unique stamp ▶ ▶
One-time-Stamps Reusable-RFID-Stamps
.
Lars Fischer
10/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Proof-of-Distance Schemes e5 e4 e1 d e2
..
▶ ▶
s e3
Lars Fischer
▶
▶
Distance Travelled Orthogonal Forward Propagation Backward Propagation
11/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Distance Travelled Scheme ei
ei−1
a i) d t(
s.
d
Projected Vector Lenght: dt (ai ) := δ(ei , ei+1 )
Fair Payment: p(ai ) =
p(s, d) · dt (ai ) ∑ dt (aj ) j
Lars Fischer
12/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Orthogonal Payment Scheme ei d
s .
) d o(a i
Projected Vector Lenght: \ do (ai ) := δ((s − ei ) · (d − s)).
Fair Payment: p(ai ) :=
Lars Fischer
p(s, d) · do (ai ) δ(s, d)
13/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Forward Propagation Scheme ei a1 , . . . , ai
s .
) d f(a i
d
Radius from s: df (ai ) = δ(s, ei )
(1)
Fair Payment: p(ai ) :=
Lars Fischer
p(s, d) · do (ai ) δ(s, d)
14/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Backward Propagation Scheme m
a1 , . . . , ai
s .
) d b(a i
d
Backward distance: db (ai ) = δ(ei , d)
(2)
Fair Payment: p(ai ) :=
Lars Fischer
p(s, d) · (δ(s, d) − do (ai ) δ(s, d) 15/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Evaluation of Schemes Distance Travelled
▶
Orthogonal
▶ ▶
Forward
▶ ▶
Backward
▶ ▶
Lars Fischer
▶ - Overall Distance/Price not known before delivery (no advance payment possible) OR overall price paid by agents will be larger than price of p(s,d) + no overshooting possible - Full payment on overshooting the target - Negative earnings for “going backwards”
- Should not overshoot d: Full Payment on overshooting - Negative Payment if moving backwards - Should not overshoot s - Negative Payment if moving backwards
16/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Discussion Advance Payment + Fitting Scheme R 1) Trivially R 2) see above R 3) ▶ Only event distance paid ▶
Already Paid Dist in Ledger
R 4) Collaborators share only combined dist R 5) No proof of delivery
Lars Fischer
17/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Conclusion
Future Work: ▶ Insurance/Value-based Payment?
▶
Bitcoin requires Connectivity — don’t want that Implement it Transfer to Time
▶
Utilisation of Size/Weight
▶ ▶
Lars Fischer
18/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Lars Fischer
[email protected] IT-Sicherheitsmanagement Universität Siegen AED8 D74C 3ABE D1CE DCF9 1460 505D ECD3 8A8D 7449
Lars Fischer
19/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
CfP GeoProcessing 2015 The Seventh International Conference on Advanced Geographic Information Systems, Applications, and Services February 22 - 27, 2015 — Lisbon, Portugal Co-located with DigitalWorld 2015 IARIA — International Acadamy, Research, and Industry Association Geo-spatial Fundamentals Geo-spatial Web Services GIS Geo-Spatial Simulation and Visualization Geo-Modeling
Digital Cartography Data Earth Geo-Observation Geo-Sensing Specific Geo-Data Processing Geo-Spatial Domain Applications Managing Geo-Spatial Data
Submission: Oct. 12th 2014 http://www.iaria.org/conferences2015/GEOProcessing15.html Lars Fischer
20/21
Fakultät Wirtschaftswissenschaften, Wirtschaftsinformatik und Wirtschaftsrecht Department IT-Security Managment
Bibliography Adam Back. Hashcash - A Denial of Service Counter-Measure. Tech. rep. Aug. 2002. url: http://www.hashcash.org/papers/hashcash.pdf. N. Chandran et al. “Position-Based Cryptography”. In: SIAM Journal on Computing 43.4 (2014), pp. 1291–1341. doi: 10.1137/100805005. eprint: http://dx.doi.org/10.1137/100805005. url: http://dx.doi.org/10.1137/100805005. Naveen Sastry, Umesh Shankar, and David Wagner. “Secure Verification of Location Claims”. In: Proceedings of the 2Nd ACM Workshop on Wireless Security. WiSe ’03. San Diego, CA, USA: ACM, 2003, pp. 1–10. isbn: 1-58113-769-9. doi: 10.1145/941311.941313. url: http://doi.acm.org/10.1145/941311.941313. Lars Fischer
21/21