2015
DOI: 10.1109/mnet.2015.7064901
|View full text |Cite
|
Sign up to set email alerts
|

Mobile cloud sensing, big data, and 5G networks make an intelligent and smart world

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
56
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 134 publications
(57 citation statements)
references
References 4 publications
1
56
0
Order By: Relevance
“…Other reverseengineering techniques may target users' sensitive personal information. For example, the increasing popularity of mobile crowdsourcing and mobile sensing projects [51] may enable an attacker to exploit various personal data such as the user location, mobility patterns or web browsing habits [52]. SDN controller hijacking: By exploiting the SDN controller implementation weaknesses, the adversary tries to divert the control ows to a controlled device [53].…”
Section: Methodsmentioning
confidence: 99%
“…Other reverseengineering techniques may target users' sensitive personal information. For example, the increasing popularity of mobile crowdsourcing and mobile sensing projects [51] may enable an attacker to exploit various personal data such as the user location, mobility patterns or web browsing habits [52]. SDN controller hijacking: By exploiting the SDN controller implementation weaknesses, the adversary tries to divert the control ows to a controlled device [53].…”
Section: Methodsmentioning
confidence: 99%
“…It will also give an intuitive architectural description of mobile cloud sensing, along with discussions about each of its individual building blocks. There are limitations to mobile cloud sensing today, but with the emergence of 5G coupled with the analysis of big data, it can address the current issues at hand [6] This problem becomes challenging in distributed systems, where coordination of activities by a central authority might not be possible or could be resource demanding [9]. Attribute Based Encryption (ABE) is a recent cryptographic primitive which is being used for access control [10].…”
Section: Han Et Al (2015)mentioning
confidence: 99%
“…Android is a mobile operating platform based on Linux, and the system architecture consists of five parts, they are Linux Kernel, Android Runtime, Libraries, Application Framework and Applications [1]. It is a highly open operating system, with its rapid development and maturity, researchers of Android application development are no longer limited to only use a single Java language [3].…”
Section: State Of the Artmentioning
confidence: 99%