Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








37,801 Hits in 4.0 sec

FIDES: A trust-based framework for secure user incentivization in participatory sensing

Francesco Restuccia, Sajal K. Das
2014 Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014  
significant amount of revenue with respect to existing reward mechanisms. 1 FIDES is the latin word for faith and trust, and is the name of the Roman goddess of trust.  ...  Next, we propose a scalable and secure trust-based framework, called FIDES, which relies on the concept of mobile security agents (MSAs) and Jøsang's trust model to rule out incorrect reports and reward  ...  save a large amount of revenue (thousands of revenue units with respect to [11] ) and achieve high reliability levels of sensed data.  ... 
doi:10.1109/wowmom.2014.6918972 dblp:conf/wowmom/RestucciaD14 fatcat:2uwd6jz54jgi3jyizjyzn5uppe

Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services

Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian, Li Lin, Biao Jin
2018 Wireless Communications and Mobile Computing  
In order to tackle the above issues, in this paper, we propose a reliable hybrid incentive mechanism for enhancing crowdsensing participations by encouraging and stimulating sensing users with both reputation  ...  Even in the case of partial sensing data leakage, differential privacy mechanism can still ensure the security of the sensing user's privacy.  ...  Wireless Communications and Mobile Computing  ... 
doi:10.1155/2018/8959635 fatcat:ja4osaioirdcvkzqnvqiuvixbe

Analysis of mobile payment security measures and different standards

Saleem Kadhiwal, Anwar Usman Shaheed Zulfiquar
2007 Computer fraud & security  
However, the security depends on the application whether the security mechanisms are implemented or not 6 .  ...  Transport Layer Security Mechanisms Along with the service there are also transport layer security mechanisms like SSL/ TLS (Internet Secure Socket Layer) protocols.  ... 
doi:10.1016/s1361-3723(07)70077-5 fatcat:wfja27aux5fnnj2rince67aqei

A Novel Collaborative Cognitive Dynamic Network Architecture [article]

Beatriz Lorenzo, F. Javier Gonzalez-Castano, Yuguang Fang
2016 arXiv   pre-print
for data and spectrum trading with low complexity, and enable self-organizing capabilities.  ...  Increasing mobile data demands in current cellular networks and proliferation of advanced handheld devices have given rise to a new generation of dynamic network architectures (DNAs).  ...  Security Design Security measures at user and operator level are needed to guarantee the well-functioning of this architecture.  User level: in CDNA users rely on others to transmit their data but not  ... 
arXiv:1610.02895v1 fatcat:ewmmxu7narcfrpapbegzwki3vm

A Stackelberg Game Approach Towards Socially-Aware Incentive Mechanisms for Mobile Crowdsensing (Online report) [article]

Jiangtian Nie and Jun Luo and Zehui Xiong and Dusit Niyato and Ping Wang
2018 arXiv   pre-print
Mobile crowdsensing has shown a great potential to address large-scale data sensing problems by allocating sensing tasks to pervasive mobile users.  ...  To fit into practical scenarios, we further formulate a Bayesian Stackelberg game with incomplete information to analyze the interaction between the crowdsensing service provider and mobile users, where  ...  The platform can post a set of sensing tasks with different purposes, and mobile users are actively involved to perform the corresponding tasks.  ... 
arXiv:1807.08412v2 fatcat:vqtxsphi7beixkl4jkjpqk7w3m

Towards Massive Machine Type Cellular Communications [article]

Zaher Dawy, Walid Saad, Arunabha Ghosh, Jeffrey G. Andrews, Elias Yaacoub
2015 arXiv   pre-print
Automated devices such as sensors, tracking devices, and meters - often referred to as machine-to-machine (M2M) or machine-type communications (MTC) - introduce an attractive revenue stream for mobile  ...  Cellular networks have been engineered and optimized to carrying ever-increasing amounts of mobile data, but over the last few years, a new class of applications based on machine-centric communications  ...  Signaling protocol overhead is not a concern and the design provides reliable mobility and connection management mechanisms Application-dependent signaling protocols, with extremely efficient overhead  ... 
arXiv:1512.03452v1 fatcat:ndlag4axebarze5w6l2jp2bmn4

Sustainable Incentives for Mobile Crowdsensing: Auctions, Lotteries, and Trust and Reputation Systems [article]

Tony T. Luo, Salil S. Kanhere, Jianwei Huang, Sajal K. Das, Fan Wu
2017 arXiv   pre-print
Proper incentive mechanisms are critical for mobile crowdsensing systems to motivate people to actively and persistently participate.  ...  , and market-driven mechanisms.  ...  This is called an incomplete-information setting and is dealt with by Bayesian mechanism design.  ... 
arXiv:1701.00248v2 fatcat:u5w774kl3zebnome4uny2dpe7u

Next steps for mobile entertainment portals

T. Raghu, R. Ramesh, A.B. Whinston
2002 Computer  
As with other e-commerce applications, wireless games must be reliable, scalable, and secure.  ...  Therefore, multiplayer games must depend heavily on effective cus-Mobile entertainment portals are already appearing, but game designers lack tools for designing content and services.  ...  As with other e-commerce applications, wireless games must be reliable, scalable, and secure.  ... 
doi:10.1109/mc.2002.999777 fatcat:34ws6quq6jhxhiifj5mnlxb7ve

D3.3 Business models report

Stéphanie Petit, Karine Laffont Eloire
2023 Zenodo  
The project's innovative four-stage replication approach is designed to showcase and disseminate best practices for sustainable urban development and mobility.  ...  This report is therefore addressed to cities and local authorities that have to meet mobility challenges (i.e. high costs and low margin, broad set of partners, competing with private car) by providing  ...  guarantees, Bike O&M, App maintenance, media, security & privacy, Human Resources & contractors, Transversal costs (legal, insurance, HR, finance, offices, etc.)  O&M costs depend on the size of the  ... 
doi:10.5281/zenodo.8369927 fatcat:ap5nwxkc3vax5iaw2zmaxcrco4

General Survey on Security Issues on Internet of Things

Dolly Das, Bobby Sharma
2016 International Journal of Computer Applications  
Hence a flexible mechanism can deal with the security threats in the dynamic environment of Internet of Things and continuous researches and new ideas needs to be regulated periodically for various upcoming  ...  This paper basically tries to cover up the security issues and challenges of Internet of Things along with a brief introduction on Internet of Things, its elements and components such as Radio Frequency  ...  -firstly with the introduction, its implementation, application, architecture, key components and elements, challenges, issues, security issues and threats, Internet of Things devices, security management  ... 
doi:10.5120/ijca2016909113 fatcat:5xdd6azjoramdgeojenh7c2r4q

Beyond technology

L. Burgstahler, K. Dolzer, C. Hauser, J. Jähnert, S. Junghans, C. Macián, W. Payer
2003 Proceedings of the ACM SIGCOMM workshop on Revisiting IP QoS What have we learned, why do we care? - RIPQoS '03  
First among them is the lack of a commercialization model for the Internet together with the necessary accounting and charging architecture.  ...  Furthermore, the practical requirements imposed by those parties to any successful QoS architecture have not been fully taken into account: Ease of management, simplicity and measurable guarantees are  ...  Within this context, our evaluation includes traffic-dependent solutions like scheduling, shaping, routing etc., security-and mobility-related issues as well as economic ones like pricing.  ... 
doi:10.1145/944592.944597 fatcat:oqtxawumq5hhjbhkau7t5u5kzu

Index-based insurance for climate risk management and rural development in Syria

Ihtiyor Bobojonov, Aden Aw-Hassan, Rolf Sommer
2013 Climate and Development  
Insurance schemes designed according to these indexes performed very well in terms of covering revenue losses in most of the extreme drought years observed in the country.  ...  The paper examines the risk minimization potential of three index-insurance schemes: (1) a statistical index, (2) an agro-meteorologically based index and (3) a remote-sensing based index.  ...  Martin Odening for their very 429 useful comments and suggestions. We are also very grateful to the editor and two anonymous 430 reviewers for their comments. All remaining errors are ours. 431  ... 
doi:10.1080/17565529.2013.844676 fatcat:lig57myyzvauxf6z5ojwabhicy

Hierarchical spectrum market and the design of contracts for mobile providers

Pablo J.C. de Carvalho, Aparna Gupta, Koushik Kar
2013 ACM SIGMOBILE Mobile Computing and Communications Review  
In this paper, we propose a hierarchical market structure and contracting mechanisms that could be used by wireless/mobile service providers to trade spectrum and spectrum-derived services with each other  ...  Finally, the role and function of present day mobile virtual networks operators (MVNO) and the mobile network operators (MNO) are discussed from the context of the proposed market structure.  ...  Nevertheless, a clear design of the market structure has yet to emerge, along with contract types and delivery mechanisms for this transition. I.C.  ... 
doi:10.1145/2557968.2557976 fatcat:422me363tzagvmaanl4guexvuy

Customer and Network Value of Mobile Services: Balancing Requirements and Strategic Interests

Timber Haaker, Harry Bouwman, Edward Faber
2004 International Conference on Information Systems  
the service domain; security, quality of service and system integration in the technology domain; network governance in the organization domain; and revenue sharing in the finance domain).  ...  Designing business models for mobile services is a complex undertaking.  ...  Acknowlegements We thank the reviewers for their careful reading of the manuscript and the useful suggestions.  ... 
dblp:conf/icis/HaakerBF04 fatcat:b3aqe23z7raerkojxaj52i2tzq

Towards Secure Mobile Multiagent Based Electronic Marketplace Systems

Klaus Fischer, Dieter Hutter, Matthias Klusch, Werner Stephan
2002 Electronical Notes in Theoretical Computer Science  
of (mobile) agents and societies of agents, security functions, and the implementation of the architectural design and abstract security solutions on existing platforms. c 2002 Published by Elsevier Science  ...  This methodology will cover requirement analysis including imposed security issues, system design, and implementation of such systems.  ...  At the application architecture level, we investigate on how security requirements of the different types of virtual markets can be formalized, and later-on guaranteed (verified) depending on which security  ... 
doi:10.1016/s1571-0661(04)80337-2 fatcat:kny4vf4gqzbklblcn7pldy6bim
« Previous Showing results 1 — 15 out of 37,801 results