A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing

被引:92
|
作者
Feng, Wei [1 ]
Yan, Zheng [1 ,2 ]
Zhang, Hengrun [3 ,4 ]
Zeng, Kai [3 ,4 ]
Xiao, Yu [2 ]
Hou, Y. Thomas [5 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
[3] George Mason Univ, Dept Comp Sci, Dept Elect & Comp Engn, Fairfax, VA 22030 USA
[4] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
[5] Virginia Polytech Inst & State Univ, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 04期
基金
美国国家科学基金会; 芬兰科学院;
关键词
Mobile crowdsourcing (MCS); privacy; security; trust; wireless sensor network (WSN); PARTICIPATORY SENSING APPLICATIONS; REPUTATION FRAMEWORK; INCENTIVE MECHANISM; CROWD; INTERNET; TRUSTWORTHINESS; MANAGEMENT; ASSURANCE; ANONYMITY; SYSTEM;
D O I
10.1109/JIOT.2017.2765699
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of sensor-rich mobile devices (e.g., smart phones and wearable devices), mobile crowd-sourcing (MCS) has emerged as an effective method for data collection and processing. Compared with traditional wireless sensor networking, MCS holds many advantages such as mobility, scalability, cost-efficiency, and human intelligence. However, MCS still faces many challenges with regard to security, privacy, and trust. This paper provides a survey of these challenges and discusses potential solutions. We analyze the characteristics of MCS, identify its security threats, and outline essential requirements on a secure, privacy-preserving, and trustworthy MCS system. Further, we review existing solutions based on these requirements and compare their pros and cons. Finally, we point out open issues and propose some future research directions.
引用
收藏
页码:2971 / 2992
页数:22
相关论文
共 50 条
  • [21] Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks
    Wu, Yulei
    Ko, Ryan
    Al-Dubai, Ahmed
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (03) : 1587 - 1589
  • [22] SALT cryptography for privacy in mobile crowdsourcing
    Joshi S.
    Saini H.
    Rathee G.
    International Journal of Information Technology, 2020, 12 (2) : 585 - 591
  • [23] Special Issue on Advances in Trust, Security and Privacy for Wireless and Mobile Networks
    Yulei Wu
    Ryan Ko
    Ahmed Al-Dubai
    Wireless Personal Communications, 2014, 75 : 1587 - 1589
  • [24] Holistic Estimation of Security, Privacy and Trust in Mobile Ad Hoc Networks
    Savola, Reijo
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2037 - 2042
  • [25] Android mobile VoIP apps: a survey and examination of their security and privacy
    Azfar, Abdullah
    Choo, Kim-Kwang Raymond
    Liu, Lin
    ELECTRONIC COMMERCE RESEARCH, 2016, 16 (01) : 73 - 111
  • [26] Android mobile VoIP apps: a survey and examination of their security and privacy
    Abdullah Azfar
    Kim-Kwang Raymond Choo
    Lin Liu
    Electronic Commerce Research, 2016, 16 : 73 - 111
  • [27] Datalog for Security, Privacy and Trust
    Bonatti, Piero A.
    DATALOG RELOADED: FIRST INTERNATIONALWORKSHOP, DATALOG 2010, 2011, 6702 : 21 - 36
  • [28] Obstacles of Mobile Crowdsourcing: A Survey
    Islam, Linta
    Alvi, Syada Tasmia
    Uddin, Mohammed Nasir
    Rahman, Mafizur
    2019 IEEE PUNE SECTION INTERNATIONAL CONFERENCE (PUNECON), 2019,
  • [29] e-Health PST (Privacy, Security and Trust) Mobile Networking Infrastructure
    Liu, W.
    Park, E. K.
    Zhu, S. S.
    2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
  • [30] Guest Editorial: Security, privacy and trust in future networks and mobile computing Introduction
    Sun, Zhili
    Criuckshank, Haitham
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 20 : 1 - 2