2021
DOI: 10.1109/jiot.2021.3068490
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable, Reliable, and Privacy-Preserving Data Aggregation in Fog-Assisted Mobile Crowdsensing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 45 publications
0
13
0
Order By: Relevance
“…They have proposed a method, data membership group-based multiple-data aggregation, which first divides the smart grid meters into different groups so that these groups can generate an encrypted key for their data and then dynamic leave and join along with the meter replacement methods are used for the data aggregation. In the paper, Yan et al [6], for the fog nodes having untrusted servers, a data aggregation method for Fog-Assisted Mobile Crowd Sensing has been proposed for sharing the data among the users. The method preserves the privacy of the user's data and the aggregated data results.…”
Section: Figure 1 Data Aggregation In Wsnsmentioning
confidence: 99%
See 1 more Smart Citation
“…They have proposed a method, data membership group-based multiple-data aggregation, which first divides the smart grid meters into different groups so that these groups can generate an encrypted key for their data and then dynamic leave and join along with the meter replacement methods are used for the data aggregation. In the paper, Yan et al [6], for the fog nodes having untrusted servers, a data aggregation method for Fog-Assisted Mobile Crowd Sensing has been proposed for sharing the data among the users. The method preserves the privacy of the user's data and the aggregated data results.…”
Section: Figure 1 Data Aggregation In Wsnsmentioning
confidence: 99%
“…Using these considerations, we can evaluate all the misclassified packets (nodes) which are trustable for the communication metric. This evaluation expression is given as (6).…”
Section: 𝑦 ̃𝑗 = 𝑁(𝑦 𝑗 ) = 𝑦 𝑗 + 𝛿 𝑗mentioning
confidence: 99%
“…Decrypt all the ciphertext in RST t S i with Key i ; (7) if e end user cannot decrypt the ciphertext normally then (8) Completeness � false; return Completeness; (9) end if (10) Calculate the value of Ω i which is the total number of the queried locations in RST t S i ; (11) for j � 1 to Ω i do (12) if DPP t i,x j is not originally in RST t S i (DPP t i,x j is a Data-proof Packet corresponding to Loc t i,x j which is in QR I MWSN then (13) Completeness � false; return Completeness; (14) end if (15) Calculate the value of c t i,x j which is the total number of the sensed data items in DPP t i,x j ; ( 16) (33) if (n t i,x j is not included in DPP t i,x j in R t ) ‖ (no sensed data item in DPP t i,x j is encrypted with a sequence number) ‖ (the sequence numbers encrypted in DPP t i,x j are not sorted in ascending order from 1) ‖ (any sensed data item encrypted in DPP t i,x j is not originally encrypted with Loc t i,x j ) ‖ (E Key i μ t i,x j , Loc t i,x j is not originally included in DPP t i,x j ) then (34) Completeness � false; return Completeness; (35) end if (36) if n t i,x j � c t i,x j then (37) if c t i,x j ≠ μ t i,x j then (38) Completeness � false; return Completeness; (39) else…”
Section: Data Availabilitymentioning
confidence: 99%
“…e fog nodes may be captured by the nearby attackers or may suffer from the attacks arising from the cloud. In other words, the fog nodes may become untrusted [9,10] under such attacks. Meanwhile, the application servers in the cloud are facing many kinds of attacks, and some of the cloud servers may also not be trustworthy [11][12][13].…”
Section: Introductionmentioning
confidence: 99%
“…Data aggregation is an essential prerequisite for data collection and information sharing in mobile crowdsensing networks. Data aggregation eliminates redundant information and extracts valuable information by processing local sensing data [4]. In smart grid applications, electricity consumption data is the basis for power companies to adjust power supply and demand control in real-time.…”
Section: Introductionmentioning
confidence: 99%