2011
DOI: 10.1016/j.pmcj.2010.04.001
|View full text |Cite
|
Sign up to set email alerts
|

AnonySense: A system for anonymous opportunistic sensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
126
0
6

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 151 publications
(132 citation statements)
references
References 18 publications
0
126
0
6
Order By: Relevance
“…In order to make it difficult for an adversary to link data reports to the reporter, the reports must be anonymized. However, anonymization per se is not a strong measure against privacy attacks as long as the attacker can link several data reports from the same user or can analyze the reports to infer information about the user who has performed the sensing (Shin et al 2011).…”
Section: The Challenge Of Privacymentioning
confidence: 99%
See 3 more Smart Citations
“…In order to make it difficult for an adversary to link data reports to the reporter, the reports must be anonymized. However, anonymization per se is not a strong measure against privacy attacks as long as the attacker can link several data reports from the same user or can analyze the reports to infer information about the user who has performed the sensing (Shin et al 2011).…”
Section: The Challenge Of Privacymentioning
confidence: 99%
“…In AnonySense Shin et al 2011), privacy-preserving tasking is achieved as follows: a sensing task is created by an application and sent to the 'Registration Authority' (RA). RA checks the validity of the task for privacy safeness and forwards it to the Task Service (TS).…”
Section: Privacy-preserving Taskingmentioning
confidence: 99%
See 2 more Smart Citations
“…The former, called pull-based approach, used in [9] is a proactive deployment strategy where mobile phones, with or without an implication of the participant, download directly a sensing task from a remote server. The latter, push-based approach, automatically propagates the sensing tasks to the mobiles devices of participants.…”
Section: State Of the Art And Limitationsmentioning
confidence: 99%