“…In addition, some reputation systems adopt incentive mechanisms to motivate participants to join sensing campaigns. Such systems are vulnerable to selfish adversaries who try to gain higher reputation scores or more incentives than they merit [36,37].…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…• GPS spoofing: Another set of attacks was defined in [36]. These attacks target to tamper with the sensing campaign through reporting an inaccurate location information.…”
Section: Attacks On Participatory Sensing Applicationsmentioning
confidence: 99%
“…While malicious adversaries offer their contributions without concern to the task requirements. In addition, selfish adversaries arise with the systems which adopt some incentive mechanisms [36,37]. Selfish adversaries attempt to increase their utility (e.g.…”
Section: Threat Modelmentioning
confidence: 99%
“…Hybrid trust systems seek to find a balance between scalability and the overhead distribution among the application server and the participants (e.g. [92,37,36]). …”
Section: Merits and Limitations Of Different Distributionsmentioning
confidence: 99%
“…Restuccia et al introduced a framework (FIDES) in [36] to defend against the GPS spoofing attacks. A mobile security agent (MSA) is deployed into the sensing area (e.g.…”
“…In addition, some reputation systems adopt incentive mechanisms to motivate participants to join sensing campaigns. Such systems are vulnerable to selfish adversaries who try to gain higher reputation scores or more incentives than they merit [36,37].…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…• GPS spoofing: Another set of attacks was defined in [36]. These attacks target to tamper with the sensing campaign through reporting an inaccurate location information.…”
Section: Attacks On Participatory Sensing Applicationsmentioning
confidence: 99%
“…While malicious adversaries offer their contributions without concern to the task requirements. In addition, selfish adversaries arise with the systems which adopt some incentive mechanisms [36,37]. Selfish adversaries attempt to increase their utility (e.g.…”
Section: Threat Modelmentioning
confidence: 99%
“…Hybrid trust systems seek to find a balance between scalability and the overhead distribution among the application server and the participants (e.g. [92,37,36]). …”
Section: Merits and Limitations Of Different Distributionsmentioning
confidence: 99%
“…Restuccia et al introduced a framework (FIDES) in [36] to defend against the GPS spoofing attacks. A mobile security agent (MSA) is deployed into the sensing area (e.g.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.