2018
DOI: 10.1109/jiot.2017.2765699
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing

Abstract: Abstract-With the popularity of sensor-rich mobile devices (e.g., smart phones and wearable devices), Mobile Crowdsourcing (MCS) has emerged as an effective method for data collection and processing. Compared with traditional Wireless Sensor Networking (WSN), MCS holds many advantages such as mobility, scalability, cost-efficiency, and human intelligence. However, MCS still faces many challenges with regard to security, privacy and trust. This paper provides a survey of these challenges and discusses potential… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
55
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
5

Relationship

1
9

Authors

Journals

citations
Cited by 118 publications
(55 citation statements)
references
References 122 publications
0
55
0
Order By: Relevance
“…Nevertheless, with today's computer specifications, where even the most constrained devices can process data much faster than humans, the memorability characteristic is not a priority in environments such as Fog computing or F2C. In fact, since such characteristic may represent a security issue -such as the identity forging thread addressed in [15] [16]-, it is not recommended. In this section we have compiled a list of requirements that according to [13], [17] and [18] an IDMS like the one presented in section V should meet for a successful and effective management of identities in F2C systems.…”
Section: Idms Requirements In F2c Systemsmentioning
confidence: 99%
“…Nevertheless, with today's computer specifications, where even the most constrained devices can process data much faster than humans, the memorability characteristic is not a priority in environments such as Fog computing or F2C. In fact, since such characteristic may represent a security issue -such as the identity forging thread addressed in [15] [16]-, it is not recommended. In this section we have compiled a list of requirements that according to [13], [17] and [18] an IDMS like the one presented in section V should meet for a successful and effective management of identities in F2C systems.…”
Section: Idms Requirements In F2c Systemsmentioning
confidence: 99%
“…To be specific, crowdsourcing that exploits the collective intelligence of the human crowd holds many advantages such as scalability, mobility, and cost-efficiency and can effectively enhance the intelligence of the services, and improve the interactions between the human and the environment [24]. The advantages of crowdsourcing enable a crowdsourcing solution to support a great number of applications in the social IoT, ranging from social trend understanding and positioning services [22,47] to smart home, smart city, and smart traffic [25].…”
Section: Introductionmentioning
confidence: 99%
“…Hence, the various limitation of WSN requires different security challenges to tackle such constraint problems. Big efforts are applied by many researchers to overcome the security issues in WSN and other constraints of WSN [7][8]. Also, many security protocols are suggested by the researchers and practicioner such as cryptography, secure routing, and keymanagement scheme and etc [9][10].…”
Section: Introductionmentioning
confidence: 99%