2020
DOI: 10.3390/s20113280
|View full text |Cite
|
Sign up to set email alerts
|

SenseCrypt: A Security Framework for Mobile Crowd Sensing Applications

Abstract: The proliferation of mobile devices such as smartphones and tablets with embedded sensors and communication features has led to the introduction of a novel sensing paradigm called mobile crowd sensing. Despite its opportunities and advantages over traditional wireless sensor networks, mobile crowd sensing still faces security and privacy issues, among other challenges. Specifically, the security and privacy of sensitive location information of users remain lingering issues, considering the “on” and “off” state… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 53 publications
0
4
0
Order By: Relevance
“…The CLASC approach provides confidentiality, integrity, mutual authentication, and anonymity, upholding personal privacy to a higher standard than anonymization alone. In another example, a CLASC was developed to secure sensitive location data from smartphone crowd-sensing participants, protecting them against data privacy attacks [180]. A combination of pseudonymization and anonymization techniques can provide additional protection, where data is first made anonymous by removing any personal identifiers and then encrypted before storage [108].…”
Section: Encryptionmentioning
confidence: 99%
“…The CLASC approach provides confidentiality, integrity, mutual authentication, and anonymity, upholding personal privacy to a higher standard than anonymization alone. In another example, a CLASC was developed to secure sensitive location data from smartphone crowd-sensing participants, protecting them against data privacy attacks [180]. A combination of pseudonymization and anonymization techniques can provide additional protection, where data is first made anonymous by removing any personal identifiers and then encrypted before storage [108].…”
Section: Encryptionmentioning
confidence: 99%
“…Challenge-response is also a key in handling attacks of ecommerce transaction attacks. Another important protocol needs to be tapped into any applications is the direct assertions [43]. As most of the authorization permission is given right after the user authenticate themselves, this could lead to the issue of an unauthorized user still manage to brute force and penetrate a system.…”
Section: Authentications Protocol and Technologiesmentioning
confidence: 99%
“…The correct way is for all authorization permissions and rights should be accessed for a user before this user is invited to authenticate himself [44]. The usage of direct assertion [43], [45] could be the answer to all the security issues revolving any technology and applications. Finally, with the importance of each device and users no trusting each other, the need for all connected devices and user to be accessed before the authentication process is essential.…”
Section: Authentications Protocol and Technologiesmentioning
confidence: 99%
“…Moreover, the increasing popularity of mobile crowd sensing highlights the urgent issue of malicious data injection. Engaging in such malicious behaviors has the potential to significantly compromise the precision and reliability of gathered data, thereby hindering the capacity to conduct precise analysis and make informed decisions [10]. When faced with this significant obstacle, the use of autoencoders presents itself as a potentially fruitful approach.…”
Section: Introductionmentioning
confidence: 99%