Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems

Recent advances in sensing, computing, and networking have paved the way for the emerging paradigm of mobile crowd sensing (MCS). The openness of such systems and the richness of data MCS users are expected to contribute to them raise significant concerns for their security, privacy-preservation and resilience. Prior works addressed different aspects of the problem. But in order to reap the benefits of this new sensing paradigm, we need a holistic solution. That is, a secure and accountable MCS system that preserves user privacy, and enables the provision of incentives to the participants. At the same time, we are after an MCS architecture that is resilient to abusive users and guarantees privacy protection even against multiple misbehaving and intelligent MCS entities (servers). In this paper, we meet these challenges and propose a comprehensive security and privacy-preserving architecture. With a full blown implementation, on real mobile devices, and experimental evaluation we demonstrate our system's efficiency, practicality, and scalability. Last but not least, we formally assess the achieved security and privacy properties. Overall, our system offers strong security and privacy-preservation guarantees, thus, facilitating the deployment of trustworthy MCS applications.

[1]  Pablo Rodriguez,et al.  On economic heavy hitters: shapley value analysis of 95th-percentile pricing , 2010, IMC '10.

[2]  Chen-Khong Tham,et al.  Fairness and social welfare in incentivizing participatory sensing , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[3]  Claudio Soriente,et al.  Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI) , 2013, IEEE Transactions on Information Forensics and Security.

[4]  Delphine Christin,et al.  Privacy in mobile participatory sensing , 2016 .

[5]  Panagiotis Papadimitratos,et al.  SPPEAR: security & privacy-preserving architecture for participatory-sensing applications , 2014, WiSec '14.

[6]  Marc Joye,et al.  A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.

[7]  Neeli R. Prasad,et al.  People-centric sensing in assistive healthcare: Privacy challenges and directions , 2011, Secur. Commun. Networks.

[8]  Panagiotis Papadimitratos,et al.  Trustworthy People-Centric Sensing: Privacy, security and user incentives road-map , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).

[9]  Boleslaw K. Szymanski,et al.  Socially-aware market mechanism for participatory sensing , 2012, MiSeNet '12.

[10]  Panagiotis Papadimitratos,et al.  Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems , 2015, IEEE Transactions on Intelligent Transportation Systems.

[11]  Apu Kapadia,et al.  Opportunistic sensing: Security challenges for the new paradigm , 2009, 2009 First International Communication Systems and Networks and Workshops.

[12]  H. T. Mouftah,et al.  Trustworthy Sensing for Public Safety in Cloud-Centric Internet of Things , 2014, IEEE Internet of Things Journal.

[13]  Zhu Han,et al.  Incentive mechanism for collaborative smartphone sensing using overlapping coalition formation games , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[14]  Wei Cheng,et al.  ARTSense: Anonymous reputation and trust in participatory sensing , 2013, 2013 Proceedings IEEE INFOCOM.

[15]  Marco Fiore,et al.  Large-scale urban vehicular mobility for networking research , 2011, 2011 IEEE Vehicular Networking Conference (VNC).

[16]  Panagiotis Papadimitratos,et al.  SHIELD: a data verification framework for participatory sensing systems , 2015, WISEC.

[17]  Panagiotis Papadimitratos,et al.  SEROSA: SERvice oriented security architecture for Vehicular Communications , 2013, 2013 IEEE Vehicular Networking Conference.

[18]  Sivan Toledo,et al.  VTrack: accurate, energy-aware road traffic delay estimation using mobile phones , 2009, SenSys '09.

[19]  Tal Malkin,et al.  Reputation Systems for Anonymous Networks , 2008, Privacy Enhancing Technologies.

[20]  Bruno Blanchet,et al.  Automatic proof of strong secrecy for security protocols , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[21]  Jan Camenisch,et al.  Group Signatures: Better Efficiency and New Theoretical Aspects , 2004, SCN.

[22]  Felix C. Freiling,et al.  Location privacy in urban sensing networks: research challenges and directions [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[23]  Jianfeng Ma,et al.  TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing , 2013, IEEE Transactions on Information Forensics and Security.

[24]  Roger Wattenhofer,et al.  Ikarus: large-scale participatory sensing at high altitudes , 2011, HotMobile '11.

[25]  Miguel A. Labrador,et al.  P-Sense: A participatory sensing system for air pollution monitoring and control , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[26]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[27]  Chi-Yin Chow,et al.  Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments , 2011, GeoInformatica.

[28]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[29]  Cyrus Shahabi,et al.  TAPAS: Trustworthy privacy-aware participatory sensing , 2012, Knowledge and Information Systems.

[30]  Bin Guo,et al.  From participatory sensing to Mobile Crowd Sensing , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[31]  Naixue Xiong,et al.  Anonymity-Based Privacy-Preserving Data Reporting for Participatory Sensing , 2015, IEEE Internet of Things Journal.

[32]  Lei Chen,et al.  Free Market of Crowdsourcing: Incentive Mechanism Design for Mobile Sensing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[33]  Minho Shin,et al.  AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..

[34]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[35]  Deborah Estrin,et al.  Examining micro-payments for participatory sensing data collections , 2010, UbiComp.

[36]  Vana Kalogeraki,et al.  Privacy preservation for participatory sensing data , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[37]  Diogo R. Ferreira,et al.  Context Inference for Mobile Applications in the UPCASE Project , 2009, MOBILWARE.

[38]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[39]  Jan Camenisch,et al.  How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.

[40]  Delphine Reinhardt Privacy in mobile participatory sensing: Current trends and future challenges , 2016, J. Syst. Softw..

[41]  Xi Fang,et al.  Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.

[42]  Salil S. Kanhere,et al.  IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.

[43]  Tassos Dimitriou,et al.  PEPPeR: A Querier's Privacy Enhancing Protocol for PaRticipatory Sensing , 2012, MobiSec.

[44]  Andrew Raij,et al.  A Survey of Incentive Techniques for Mobile Crowd Sensing , 2015, IEEE Internet of Things Journal.

[45]  Ioannis Krontiris,et al.  Monetary incentives in participatory sensing using multi-attributive auctions , 2012, Int. J. Parallel Emergent Distributed Syst..

[46]  Hovav Shacham,et al.  Short Group Signatures , 2004, CRYPTO.

[47]  Neil A. M. Maiden Monitoring Our Requirements , 2013, IEEE Software.

[48]  Salil S. Kanhere,et al.  A survey on privacy in mobile participatory sensing applications , 2011, J. Syst. Softw..

[49]  Baik Hoh,et al.  Dynamic pricing incentive for participatory sensing , 2010, Pervasive Mob. Comput..

[50]  Jyrki Wallenius,et al.  European Journal of Operational Research Multi-attribute Online Reverse Auctions: Recent Research Trends , 2022 .

[51]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[52]  Tarek F. Abdelzaher,et al.  PoolView: stream privacy for grassroots participatory sensing , 2008, SenSys '08.

[53]  Meng-Chieh Chiu,et al.  Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing , 2013, MobiSys '13.

[54]  Iordanis Koutsopoulos,et al.  Optimal incentive-driven design of participatory sensing systems , 2013, 2013 Proceedings IEEE INFOCOM.

[55]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[56]  Suman Nath,et al.  MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.

[57]  Moni Naor,et al.  Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.

[58]  Ramachandran Ramjee,et al.  PRISM: platform for remote sensing using smartphones , 2010, MobiSys '10.