2016
DOI: 10.1016/j.comnet.2015.12.022
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving QoI-aware participant coordination for mobile crowdsourcing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 64 publications
(44 citation statements)
references
References 22 publications
0
44
0
Order By: Relevance
“…In the process of popularization of Internet of things technology, the problem of privacy protection has encountered a lot of new situations and challenges. In recent years, many scholars began to study it to solve the privacy issues, and have achieved some results [3]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…In the process of popularization of Internet of things technology, the problem of privacy protection has encountered a lot of new situations and challenges. In recent years, many scholars began to study it to solve the privacy issues, and have achieved some results [3]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…Most SC studies assume the push mode and thus emphasize privacy protection during the tasking phase. With the pull mode, the main focus of privacy protection is shifted to the reporting phase, which has been well studied in the context of participatory sensing (e.g., [29,16,36,2,39]). With participatory sensing, the goal is to exploit the ability of mobile users to collect and share data using their sensor-equipped phones for a given campaign.…”
Section: Task Assignment: the Focus Of Spatial Crowdsourcingmentioning
confidence: 99%
“…Therefore, a communication mechanism is required to provide the ubiquitous and pervasive availability of data collected by IoT devices of one system to the IoT devices of other systems within the building [2,4,18]. Other important concerns for IoT in a smart building are energy efficiency [19,20], admission control [21], naming and addressing [22], privacy and security [23], mobile sensing [24,25,26], etc.…”
Section: Introductionmentioning
confidence: 99%