2016
DOI: 10.1109/twc.2015.2495291
|View full text |Cite
|
Sign up to set email alerts
|

SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing

Abstract: The plummeting cost of Bluetooth tags and the ubiquity of mobile devices are revolutionizing the traditional lost-and-found service. This paper presents SecureFind, a secure and privacy-preserving object-finding system via mobile crowdsourcing. In SecureFind, a unique Bluetooth tag is attached to every valuable object, and the owner of a lost object submits an object-finding request to many mobile users via the SecureFind service provider. Each mobile user involved searches his vicinity for the lost object on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(14 citation statements)
references
References 39 publications
(29 reference statements)
0
14
0
Order By: Relevance
“…The results show that the use of modern devices, such as Raspberry Pi2, satisfies the requirements for future traffic management systems in smart cities. Sun et al [84] present a secure and privacy protective object finding application via mobile crowdsourcing using 4G/5G. They proposed an approach called SecureFind that obtains the finding request from the service provider.…”
Section: ) Access Communication Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…The results show that the use of modern devices, such as Raspberry Pi2, satisfies the requirements for future traffic management systems in smart cities. Sun et al [84] present a secure and privacy protective object finding application via mobile crowdsourcing using 4G/5G. They proposed an approach called SecureFind that obtains the finding request from the service provider.…”
Section: ) Access Communication Networkmentioning
confidence: 99%
“…Another approach is based on trusted sensor hardware (sign) on a mobile device. These approaches need to be addressed to make sure that the integrity of the sensor data generated by the participants is reliable to provide significant decisions from the aggregate sensor data [43], [84], [105], [114]. Trust-based scores can be used and updated dynamically in order to quantify the trust level of each participant in MCS and thus deal with malicious participants (or simply participants sending erroneous measurements due to some sensor defect).…”
Section: B Privacy and Securitymentioning
confidence: 99%
“…For example, the solution for a dynamic M2M system should strike a balance between mobility and performance if its M2M objective is performance-oriented, since the M2M device with a high mobility usually has constrained resources [49]. Another example is that the solution for a consumption-oriented M2M system can utilize the fixed topology to lower the cost if its M2M context is static, i.e., M2M context provides an opportunity (fixed topology) to M2M objective.…”
Section: A Summary Of Three Aspects For M2m System Categorizationmentioning
confidence: 99%
“…Thus, it is challenging to find a proper trade-off among multiple conflicting design criterions. Studies that jointly consider multiple criterions are attracting more and more attentions [49], [69].…”
Section: User Satisfaction For M2m Systemsmentioning
confidence: 99%
“…Li et al [20] used the neighbors' locations to infer the location in the emerging location-based social networks. Sun et al [21] protected the location privacy on the social crowdsourcing networks. Mao et al [22] used the tweets to detect the Twitter users' situational leak such as vacation status, drunk status, and medical conditions.…”
Section: Related Workmentioning
confidence: 99%