2017 IEEE Trustcom/BigDataSE/Icess 2017
DOI: 10.1109/trustcom/bigdatase/icess.2017.342
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 28 publications
0
12
0
Order By: Relevance
“…The paper [19] proposes the privacy protectionoriented MC (PPMC) scheme to continually provide the high-quality data in the MC process. First, the PPMC scheme gives a formal definition of the sensing user's contribution based on the accuracy in data analysis.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The paper [19] proposes the privacy protectionoriented MC (PPMC) scheme to continually provide the high-quality data in the MC process. First, the PPMC scheme gives a formal definition of the sensing user's contribution based on the accuracy in data analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the PPMC scheme can motivate more users to participate in sensing tasks and provides high-quality data over a long period of time. Finally, an efficient solution is given by the prisoner's dilemma between the service provider and the mediator [19].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The security of private information in mobile crowdsensing includes the privacy of the sensing users and the security of the service provider. The sensing users anticipate that their personal data privacy is preserved during the uploading to service provider [21,22]. Since the sensing users and the mediator may not be completely trusted, the uploaded false data may potentially cause security problems to the service provider, and therefore countermeasures to malicious users and malicious attacks should be considered.…”
Section: Privacy Protection Schemementioning
confidence: 99%