Introduction
Introduction to Proof of Location
Live on TESTNET.
Proof of Location is a decentralised proof of "geolocation" which can be used to validate the geographic location of a "prover" device connected to Internet.
tl;dr
A prover (a node providing storage or compute or any DePIN service) asserts or claims their geographic location. This claim is verified by a network of watchtowers (or challengers) : decentralized set of nodes globally). This protocol relies on analyzing internet latency to determine the prover's location .
How does it work?
The protocol involves two key steps:
Calibration
Measurement
Calibration Phase
The protocol comprises a prover, whose location is to be validated and a decentralized set of watchtowers, whose location are known a priori
In calibration phase, the challengers measure Internet delay to each other via application layer UDP pings
A challenger then calibrates delay to distance mapping for itself using the delay measurements and the location of other challengers
Measurement Phase
In the measurement phase, the location claim of the prover is validated
The challengers measure delay to the prover using application layer UDP pings
Using the delay to distance mapping obtained during calibration phase, each challenger outputs a region where the prover can be present
Our protocol aggregates the output across different challengers and then outputs the maximum distance that the prover can be from its claimed location
Key Parties Involved
Payer: A party who pays for the challenge and starts one
Prover: The device connected to Internet whose location needs to be validated
Blockchain full-node: Decentralised ledger for recording all the challenge requests and outcomes
Challengers: A pool of servers that validate the location claim of the prover
Challenge coordinator: Centralised services for
Communication between the parties
Computing challenge meta data; and
Cnteracting with the ledger
Broker: Centralized API service layer
Functional description
Functionally the different components involved in Proof of Location challenge are similar to that of Proof of Backhaul. The different steps in a Proof of Location challenge remain similar to the Proof of Backhaul, except during challenge execution, the measurement phase described above to validate prover's location is carried out instead of measuring the backhaul in Proof of Backhaul.
Trust and Threat Model (current)
The trust assumptions for challenge coordinator remain same to Proof of Backhaul
Prover
The prover can claim a false location
The prover can inflate the ping delays to the challenger during measurement phase of challenge execution
Challengers
In current version of Proof of Location, the challengers are a mix of trusted and trust-free nodes.
They report their correction location
They do not inflate delays to other challengers in calibration phase
They use a correct delay to distance mapping in measurement phase
In future, our Proof of Location protocol will be able to tolerate a certain fraction of adversarial challengers, where the above trust assumptions will be relaxed
Last updated