2016
DOI: 10.1109/jiot.2016.2560768
|View full text |Cite
|
Sign up to set email alerts
|

Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems

Abstract: Recent advances in sensing, computing, and networking have paved the way for the emerging paradigm of Mobile Crowd Sensing (MCS). The openness of such systems and the richness of data MCS users are expected to contribute to them raise significant concerns for their security, privacypreservation and resilience. Prior works addressed different aspects of the problem. But in order to reap the benefits of this new sensing paradigm, we need a holistic solution. That is, a secure and accountable MCS system that pres… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 106 publications
(34 citation statements)
references
References 44 publications
0
34
0
Order By: Relevance
“…These certificates and signatures may use pseudonyms to complicate deanonymization [53], [188], though computation presents a challenge [148]. Where feasible, time-limited pseudonyms, conditional anonymity, distributed resolution authority, and passive pseudonym revocation minimize the risk of adversaries extracting identifying information from a network or pushing malicious data [159], though for some applications network scale alone may provide a means of hiding within a crowd [189].…”
Section: Network Securitymentioning
confidence: 99%
“…These certificates and signatures may use pseudonyms to complicate deanonymization [53], [188], though computation presents a challenge [148]. Where feasible, time-limited pseudonyms, conditional anonymity, distributed resolution authority, and passive pseudonym revocation minimize the risk of adversaries extracting identifying information from a network or pushing malicious data [159], though for some applications network scale alone may provide a means of hiding within a crowd [189].…”
Section: Network Securitymentioning
confidence: 99%
“…With TPM, the scheme guarantees that the data cannot be tampered by malicious workers. In [110], Gisdakis et al introduced a trusted third party for the purpose of identity and key management. The adoption of pseudonym well protects the identity privacy of workers.…”
Section: Secure and Privacy-preserving Data Reportingmentioning
confidence: 99%
“…AnonySense was one of the earliest solutions that utilize group signatures for crowdsensing. As pointed in [59], the way AnonySense [28] employs group signatures renders it vulnerable to Sybil attacks [60]. Because in AnonySense, it is impossible to identify signatures from the same participant, without opening the signatures of all data reports.…”
Section: Privacy In Crowdsensingmentioning
confidence: 99%
“…Therefore, it is important to efficiently identify abusive users. SPPEAR [27] and SP-PEAR with enhanced incentive provisioning [59] are focused on both anonymity and accountability. In SPPEAR [27], BUanonymity is achieved through pseudonym-based signature approach.…”
Section: Privacy In Crowdsensingmentioning
confidence: 99%