Data Verification andPrivacy-respecting User Remuneration in Mobile Crowd Sensing

The broad capabilities of current mobile devices have paved the way forMobile Crowd Sensing (MCS) applications. The success of this emergingparadigm strongly depends on the quality of received data ...

[1]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[2]  Bruno Blanchet,et al.  Automatic proof of strong secrecy for security protocols , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[3]  Károly Farkas,et al.  Participatory sensing based real-time public transport information service , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[4]  Ramachandran Ramjee,et al.  PRISM: platform for remote sensing using smartphones , 2010, MobiSys '10.

[5]  Bin Guo,et al.  From participatory sensing to Mobile Crowd Sensing , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[6]  Panos Papadimitratos,et al.  On the optimal allocation of adversarial resources , 2012, MiSeNet '12.

[7]  Deborah Estrin,et al.  Examining micro-payments for participatory sensing data collections , 2010, UbiComp.

[8]  Panagiotis Papadimitratos,et al.  Secure and Privacy-Preserving Smartphone-Based Traffic Information Systems , 2015, IEEE Transactions on Intelligent Transportation Systems.

[9]  Philippe Smets,et al.  The Combination of Evidence in the Transferable Belief Model , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  Felix C. Freiling,et al.  Location privacy in urban sensing networks: research challenges and directions [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[11]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[12]  Panagiotis Papadimitratos,et al.  Trustworthy People-Centric Sensing: Privacy, security and user incentives road-map , 2014, 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET).

[13]  Chen-Khong Tham,et al.  Fairness and social welfare in incentivizing participatory sensing , 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[14]  Claudio Soriente,et al.  Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI) , 2013, IEEE Transactions on Information Forensics and Security.

[15]  Panagiotis Papadimitratos,et al.  SPPEAR: security & privacy-preserving architecture for participatory-sensing applications , 2014, WiSec '14.

[16]  Panagiotis Papadimitratos,et al.  Allocating adversarial resources in wireless networks , 2013, 21st European Signal Processing Conference (EUSIPCO 2013).

[17]  Richard M. Karp,et al.  Reducibility Among Combinatorial Problems , 1972, 50 Years of Integer Programming.

[18]  Miguel A. Labrador,et al.  P-Sense: A participatory sensing system for air pollution monitoring and control , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[19]  Emiliano Miluzzo,et al.  Tapping into the Vibe of the city using VibN, a continuous sensing application for smartphones , 2011, SCI '11.

[20]  Salil S. Kanhere,et al.  IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications.

[21]  Demetrios Zeinalipour-Yazti,et al.  Crowdsourcing with Smartphones , 2012, IEEE Internet Computing.

[22]  Luc Anselin,et al.  Spatial Statistical Analysis and Geographic Information Systems , 1992 .

[23]  Levente Buttyán,et al.  RANBAR: RANSAC-based resilient aggregation in sensor networks , 2006, SASN '06.

[24]  Ioannis Krontiris,et al.  Monetary incentives in participatory sensing using multi-attributive auctions , 2012, Int. J. Parallel Emergent Distributed Syst..

[25]  Leslie G. Valiant,et al.  The Complexity of Computing the Permanent , 1979, Theor. Comput. Sci..

[26]  Naphtali Rishe,et al.  Safe cities. A participatory sensing approach , 2012, 37th Annual IEEE Conference on Local Computer Networks.

[27]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[28]  Josh Benaloh,et al.  Dense Probabilistic Encryption , 1999 .

[29]  Danny Dolev,et al.  On the Security of Public Key Protocols (Extended Abstract) , 1981, FOCS.

[30]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[31]  Daniel Krajzewicz,et al.  Recent Development and Applications of SUMO - Simulation of Urban MObility , 2012 .

[32]  P. Smets Data fusion in the transferable belief model , 2000, Proceedings of the Third International Conference on Information Fusion.

[33]  Andrew T. Campbell,et al.  Bewell: A smartphone application to monitor, model and promote wellbeing , 2011, PervasiveHealth 2011.

[34]  Sivan Toledo,et al.  VTrack: accurate, energy-aware road traffic delay estimation using mobile phones , 2009, SenSys '09.

[35]  Francisco Herrera,et al.  A Survey of Discretization Techniques: Taxonomy and Empirical Analysis in Supervised Learning , 2013, IEEE Transactions on Knowledge and Data Engineering.

[36]  Tassos Dimitriou,et al.  Moving Advanced Safety to the Cloud: Some Outcomes of SafeCity Project , 2012, Future Security.

[37]  Roger Wattenhofer,et al.  Ikarus: large-scale participatory sensing at high altitudes , 2011, HotMobile '11.

[38]  Zhendong Ma,et al.  Privacy in inter-vehicular networks: Why simple pseudonym change is not enough , 2010, 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS).

[39]  David A. Wagner,et al.  Resilient aggregation in sensor networks , 2004, SASN '04.

[40]  G. N. Lance,et al.  Mixed-Data Classificatory Programs I - Agglomerative Systems , 1967, Aust. Comput. J..

[41]  Dominic Wörner,et al.  When your sensor earns money: exchanging data for cash with Bitcoin , 2014, UbiComp Adjunct.

[42]  Yang Zhang,et al.  CarTel: a distributed mobile sensor computing system , 2006, SenSys '06.

[43]  Shonali Krishnaswamy,et al.  Mining data streams: a review , 2005, SGMD.

[44]  Panagiotis Papadimitratos,et al.  SHIELD: a data verification framework for participatory sensing systems , 2015, WISEC.

[45]  Panagiotis Papadimitratos,et al.  SEROSA: SERvice oriented security architecture for Vehicular Communications , 2013, 2013 IEEE Vehicular Networking Conference.

[46]  Ricardo J. G. B. Campello,et al.  Generalized external indexes for comparing data partitions with overlapping categories , 2010, Pattern Recognit. Lett..

[47]  Neeli R. Prasad,et al.  People-centric sensing in assistive healthcare: Privacy challenges and directions , 2011, Secur. Commun. Networks.

[48]  Miguel A. Labrador,et al.  On Sensor Data Verification for Participatory Sensing Systems , 2013, J. Networks.

[49]  R. E. Kalman,et al.  A New Approach to Linear Filtering and Prediction Problems , 2002 .

[50]  Wei Cheng,et al.  ARTSense: Anonymous reputation and trust in participatory sensing , 2013, 2013 Proceedings IEEE INFOCOM.

[51]  Cyrus Shahabi,et al.  TAPAS: Trustworthy privacy-aware participatory sensing , 2012, Knowledge and Information Systems.

[52]  João Gama,et al.  A survey on concept drift adaptation , 2014, ACM Comput. Surv..

[53]  Minho Shin,et al.  AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..