Proceedings of the 8th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2015
DOI: 10.1145/2766498.2766503
|View full text |Cite
|
Sign up to set email alerts
|

Shield

Abstract: The openness of PS systems renders them vulnerable to malicious users that can pollute the measurement collection process, in an attempt to degrade the PS system data and, overall, its usefulness. Mitigating such adversarial behavior is hard. Cryptographic protection, authentication, authorization, and access control can help but they do not fully address the problem. Reports from faulty insiders (participants with credentials) can target the process intelligently, forcing the PS system to deviate from the act… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 29 publications
(3 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…The overarching objective of our work (the verification of authentic interactions within WPANs) is largely motivated by past work in authentication [8,12,18,22,27,31,[36][37][38][40][41][42]. Authentication is a process to verify (i.e., establish the truth of) an attribute value claimed by or for a system entity [50].…”
Section: Authenticationmentioning
confidence: 99%
“…The overarching objective of our work (the verification of authentic interactions within WPANs) is largely motivated by past work in authentication [8,12,18,22,27,31,[36][37][38][40][41][42]. Authentication is a process to verify (i.e., establish the truth of) an attribute value claimed by or for a system entity [50].…”
Section: Authenticationmentioning
confidence: 99%
“…The rationale is that confidence can be estimated based on the conditional probability of occurrence of a particular traffic event at a particular location given that supporting reports have been generated. Also, Gisdakis, Giannetsos and Papadimitratos [9] have proposed a comprehensive framework that is agnostic of the cause of a faulty measurement. Each report is transformed into a probability mass, so as to compute the hypothesis with the maximum belief; the belief corresponding to this hypothesis; and the local conflict of the probability mass, as per Dempster-Shafer Theory.…”
Section: Related Workmentioning
confidence: 99%
“…Providers or between Service Providers and Queriers) or exploit the vulnerability of the openness of the participatory sensing system by polluting the data collection to degrade the participatory sensing system. Cryptographic protection, authentication, authorization and state-of-the-art techniques such as SHIELD framework [17] that combine evidence handling and data-mining techniques to identify and filter out malicious contributions are effective solutions to ensure the confidentiality and integrity of the participatory sensing system.…”
Section: Security and Privacy Concerns In Participatory Sensingmentioning
confidence: 99%