Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing 2016
DOI: 10.1145/2942358.2942375
|View full text |Cite
|
Sign up to set email alerts
|

Inception

Abstract: The recent proliferation of human-carried mobile devices has given rise to mobile crowd sensing (MCS) systems that outsource the collection of sensory data to the public crowd equipped with various mobile devices. A fundamental issue in such systems is to effectively incentivize worker participation. However, instead of being an isolated module, the incentive mechanism usually interacts with other components which may affect its performance, such as data aggregation component that aggregates workers' data and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 151 publications
(10 citation statements)
references
References 38 publications
0
10
0
Order By: Relevance
“…First of all, because IoT elements are close to the edge nodes, the fog can act as the first front of access control and encryption as well as provide isolation and contextual integrity. Besides, it can also protect privacy-sensitive data [36,37], by not allowing it to leave the edge. In addition, sensors often generate a huge volume of raw data in burst mode, i.e., there are peaks of data transmission that fluctuate over time.…”
Section: Data Collection and Protocols At The Edgementioning
confidence: 99%
“…First of all, because IoT elements are close to the edge nodes, the fog can act as the first front of access control and encryption as well as provide isolation and contextual integrity. Besides, it can also protect privacy-sensitive data [36,37], by not allowing it to leave the edge. In addition, sensors often generate a huge volume of raw data in burst mode, i.e., there are peaks of data transmission that fluctuate over time.…”
Section: Data Collection and Protocols At The Edgementioning
confidence: 99%
“…The second mechanism assumes that the CP knows the data privacy sensitivity level of each mu, and considers the variable compensation of the mu. Jin et al [21] an incentive mechanism based on privacy protection is designed. When designing the incentive mechanism, the characteristics of data fusion and data interference in the system are taken into account.…”
Section: ) Incentive Mechanismmentioning
confidence: 99%
“…The following are the most prominent extensions in this category, not to be discussed in depth here, and interested readers can refer to the literatures. These are k-anonymity [54], Tessellation [55], l-diversity [56], micro-aggregation [57], data aggregation [58], t-closeness [59], and historical k-anonymity [60].…”
Section: Anonymization-based Mechanismsmentioning
confidence: 99%