2020
DOI: 10.1109/jiot.2019.2951410
|View full text |Cite
|
Sign up to set email alerts
|

Toward Incentivizing Fog-Based Privacy-Preserving Mobile Crowdsensing in the Internet of Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(11 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…More importantly, since most data perturbation techniques introduce noises to the dataset, the data utility is reduced. In contrast with data perturbation, other research studies have applied cryptographic techniques (e.g., homomorphic encryption and public-private key signatures [40,41,49,50]) to protect users' privacy. Among all the cryptographic techniques, zero-knowledge proofs has been widely applied in areas such as blockchain (e.g., [11,15,28]), secure multi-party computation (e.g., [9,21]), and electronic voting or auctions (e.g., [18,37,38]).…”
Section: Crowdsensingmentioning
confidence: 99%
See 1 more Smart Citation
“…More importantly, since most data perturbation techniques introduce noises to the dataset, the data utility is reduced. In contrast with data perturbation, other research studies have applied cryptographic techniques (e.g., homomorphic encryption and public-private key signatures [40,41,49,50]) to protect users' privacy. Among all the cryptographic techniques, zero-knowledge proofs has been widely applied in areas such as blockchain (e.g., [11,15,28]), secure multi-party computation (e.g., [9,21]), and electronic voting or auctions (e.g., [18,37,38]).…”
Section: Crowdsensingmentioning
confidence: 99%
“…Particularly, the comparisons between our privacy-preserving hybrid sensing system with the aforementioned papers are tabulated in Table 1. 45,47,48] ✓ Data Perturbation ✓ × × [44] ✓ Data Perturbation × × × [40,41,49,50] ✓…”
Section: Comparisons To Our Workmentioning
confidence: 99%
“…Reputation mechanism has been widely used in wireless networks [32] and IoT systems to evaluate user reliability and detect malicious users. Sun et al [27] put forward the two-layer fog architecture in MCS-VANET, integrated the zero-knowledge proof technology into it, and evaluated the vehicle reputation according to the offset value of sensing data and the historical reputation value of PVs. Nan et al [28] proposed a CSII model based on cross-spatial multiple interaction to evaluate user reputation from four aspects: the data collecting time, the cover rate, the correlation, and historical reputation value.…”
Section: Reputation Mechanismmentioning
confidence: 99%
“…Reputation mechanism [27][28][29][30][31] The reputation of user is evaluated from multiple aspects.…”
Section: Research Categories Advantages Disadvantagesmentioning
confidence: 99%
“…Fog computing, as a new potential solution to improve the latency issue in cloud computing-based architectures [10], can be integrated into VANETs to decrease the transmission delay, provide reliable location awareness, and support access for more vehicles [11]. However, existing fog-based schemes do not provide for the protection of the privacy of vehicles.…”
Section: Introductionmentioning
confidence: 99%