2020
DOI: 10.1016/j.aci.2018.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of mobile crowd sensing applications

Abstract: The proliferation of mobile phones with integrated sensors makes large scale sensing possible at low cost. During mobile sensing, data mostly contain sensitive information of users such as their real-time location. When such information are not effectively secured, users’ privacy can be violated due to eavesdropping and information disclosure. In this paper, we demonstrated the possibility of unauthorized access to location information of a user during sensing due to the ineffective security mechanisms in most… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 34 publications
0
13
0
Order By: Relevance
“…However, the combination of two or more permissions sequent of Normal or Dangerous can become high risk and expose users’ privacy. For instance, if a user downloads Whatsapp, which requires the normal permission for internet access and changing audio settings, using fingerprint hardware, taking photos, reading contacts, and accessing precise location can put users at risk because the accessed data are unencrypted and can be seen in clear text that lead to data leakage [ 21 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, the combination of two or more permissions sequent of Normal or Dangerous can become high risk and expose users’ privacy. For instance, if a user downloads Whatsapp, which requires the normal permission for internet access and changing audio settings, using fingerprint hardware, taking photos, reading contacts, and accessing precise location can put users at risk because the accessed data are unencrypted and can be seen in clear text that lead to data leakage [ 21 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to Ref. [32], ensuring privacy-preserving in MCS system encourages mobile users to use MCS system applications and participate in sensing and data collection. Therefore, a properly designed framework for privacy preservation must support the workers to flexibly adjust on all three aspects, so as to provide most suitable participation for every worker as this is a critical principle as MCS essentially rely on these workers for data collection.…”
Section: Privacy and Trust Managementmentioning
confidence: 99%
“…This method ensures that the participants do not submit falsified information into the system which will compromise the trustworthiness of the system, although it is seen as compromising the privacy of the users on the other hand. Therefore the MCS system is responsible for the access control, by giving the necessary rights to authorized users [32].…”
Section: ) Authenticationmentioning
confidence: 99%
“…Mobile devices such as smartphones and tablets are quickly becoming the dominant devices for accessing Internet resources and has gained popularity with higher memory capacity, processor speed and battery life due to advancement in technology, making it suitable for mobile transactions [56,57]. Mobile phones are common in our society today due to its multi-purpose usage, the convenience and mobility advantages, ease of purchase and it is used for payment on the move; payment anywhere and anytime [5,37,40,44].…”
Section: Introductionmentioning
confidence: 99%