Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,544 Hits in 8.4 sec

Credibility on Crowdsensing Data Acquisition

Manuel Neto, Danielo Gomes, José Soares
2019 Journal of Communication and Information Systems  
This paper focuses on the credibility of crowd sensed data. The ubiquity of crowdsensing platforms has enabled the capture of sensed information useful for several applications domains.  ...  However, one concern with crowdsensing is the information credibility and, over the last few years, we have seen a variety of approaches to leverage credibility on the crowdsensing platforms.  ...  [200] introduced a privacy-aware crowdsensing design with truth discovery.  ... 
doi:10.14209/jcis.2019.26 fatcat:o4cja467jbgenap4akpxmcu3ym

Simulation Of Trust-Based Mechanism For Enhancing User Confidence In Mobile Crowdsensing Systems

Dorothy Mwongeli Kalui, Dezheng Zhang, Geoffrey Muchiri Muketha, Jared Onsomu
2020 IEEE Access  
This paper illustrates the establishment of user confidence during recruitment in MCS as it is very critical for the success of MCS systems and proposes a simulation trust-based mechanism (SiTBaM) approach  ...  For more information, see http://creativecommons.org/licenses/by/4.0/ VOLUME 8, 2020  ...  These incentives can take various forms i.e. presence/location-aware, behavioural-aware, flat incentive, mobility-aware, and mixed incentive [14] .  ... 
doi:10.1109/access.2020.2968797 fatcat:kegfiusr2bcudifqh2vze4bbd4

Adopting incentive mechanisms for large-scale participation in mobile crowdsensing: from literature review to a conceptual framework

R. I. Ogie
2016 Human-Centric Computing and Information Sciences  
The phenomenal growth in the richness and diversity of sensors on smart devices [3], combined with the inherent  ...  environment and for understanding complex urban and community dynamics [1] .  ...  This issue of location-based privacy is mostly addressed by mechanisms based on k-anonymity [53] .  ... 
doi:10.1186/s13673-016-0080-3 fatcat:euypyllcvncvbpnnulyxghncfq

Key Research Issues and Related Technologies in Crowdsourcing Data Collection

Yunhui Li, Liang Chang, Long Li, Xuguang Bao, Tianlong Gu, Lihua Yin
2021 Wireless Communications and Mobile Computing  
Furthermore, we review the key research topics and related technologies in its workflow, including task design, task-worker matching, response aggregation, incentive mechanism, and privacy protection.  ...  In recent years, a large amount of effort has been spent on crowdsourcing in data collection, to address the challenges, including quality control, cost control, efficiency, and privacy protection.  ...  response aggregation data, (4) incentive mechanism design, and (5) privacy-preserving.  ... 
doi:10.1155/2021/8745897 fatcat:vobajfz7i5bnnpfvx6vo2kzmxa

Incentive Mechanisms for Participatory Sensing

Francesco Restuccia, Sajal K. Das, Jamie Payton
2016 ACM transactions on sensor networks  
In this article, we survey existing literature on incentive mechanisms for participatory sensing systems.  ...  In particular, we present a taxonomy of existing incentive mechanisms for participatory sensing systems, which are subsequently discussed in depth by comparing and contrasting different approaches.  ...  framework for vehicle-based crowdsourcing × × Kawajiri et al. [2014] Gamification-based mechanism × × Li and Cao [2014] Two privacy-preserving incentive mechanisms × Li and Cao [2013] Privacy-aware  ... 
doi:10.1145/2888398 fatcat:bsixa53xebdkdbmedqt77cxsie

Incentive Mechanisms for Participatory Sensing: Survey and Research Challenges [article]

Francesco Restuccia and Sajal K. Das and Jamie Payton
2015 arXiv   pre-print
In this paper, we survey existing literature on incentive mechanisms for participatory sensing systems.  ...  In particular, we present a taxonomy of existing incentive mechanisms for participatory sensing systems, which are subsequently discussed in depth by comparing and contrasting different approaches.  ...  For the online case, the authors design a near-optimal truthful mechanism with an online task allocation algorithm that achieves a constant competitive ratio of θ( 1 /2).  ... 
arXiv:1502.07687v3 fatcat:ykgrtdt3vnez5hiht463viu7wa

Applications of Economic and Pricing Models for Wireless Network Security: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Zhu Han
2017 arXiv   pre-print
Unlike wireline networks, the broadcast nature and the highly dynamic change of network environments pose a number of nontrivial challenges to security design in wireless networks.  ...  This paper provides a comprehensive literature review on applications of economic and pricing theory to security issues in wireless networks.  ...  k-anonymous location privacy, truthfulness, balanced budget, and satisfaction ratio improvement Market equilibrium CN [129] Double auction Phone users Phone users Spectrum Buyers'  ... 
arXiv:1707.07846v1 fatcat:xb3jvolwmjad7oxdefdd2pq7dq

Smart Contract-Based Long-term Auction for Mobile Blockchain Computation Offloading

Tonglai Liu, Jigang Wu, Long Chen, Yalan Wu, Yinan Li
2020 IEEE Access  
However, most auction mechanisms on mobile blockchain ignore the automatic parallel execution and long-term performance.  ...  The subtasks can be offloaded from one mobile device to heterogeneous edge servers. Also, LAMB satisfies the economic properties of an auction mechanism.  ...  Furthermore, it also describes the design of smart contracts. Section IV describes the incentive mechanism.  ... 
doi:10.1109/access.2020.2974750 fatcat:pyatcsomkrbvtlihnvcq7ntvre

Game theory meets network security and privacy

Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Bacşar, Jean-Pierre Hubaux
2013 ACM Computing Surveys  
In each category, security problems, players, and game models are identified and the main results of selected works, such as equilibrium analysis and security mechanism designs are summarized.  ...  The presented works are classified into six main categories based on their topics: security of the physical and MAC layers, application layer security in mobile networks, intrusion detection systems, anonymity  ...  Furthermore, mechanism design [Nisan and Ronen 1999; Nisan 2007] has enabled researchers to design security and privacy mechanisms based on the analytical results obtained.  ... 
doi:10.1145/2480741.2480742 fatcat:55ixmohvijaelflxqrrbtnvfuu

Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Maaz Rehan, Jinjun Chen
2021 arXiv   pre-print
(PII), such as location, device ID, signal status, etc.  ...  In order to preserve this privacy leakage, various privacy preserving strategies have been developed by researchers, and according to us differential privacy is the most significant among them.  ...  [12] proposed the use of anonymization techniques such as k-anonymity to preserve privacy of CR users.  ... 
arXiv:2111.02011v2 fatcat:a5hique4fvfxrclslvpgda5jyy

Blockchain for Trust and Reputation Management in Cyber-physical Systems [article]

Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak
2021 arXiv   pre-print
In addition, we also outline challenges and future directions in developing DTRMS for CPS.  ...  In addition, the authors also introduced an algorithm, called Anonymous Proof of Location (A-PoL), to anonymously prove user's location.  ...  A TRMS can work on a single context or multiple-context awareness in deriving trust from collected evidence depending on its initial design [4] .  ... 
arXiv:2109.07721v1 fatcat:qw27quabmrebnint776yye2cwe

Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey

Nipendra Kayastha, Dusit Niyato, Ping Wang, Ekram Hossain
2011 Proceedings of the IEEE  
KEYWORDS | Community detection; content distribution; context-aware data transfer; mobile social networking services and applications; network architecture and protocol design; security and privacy; social  ...  This paper presents a comprehensive survey on the MSN specifically from the perspectives of applications, network architectures, and protocol design issues.  ...  Simply hiding certain information such as message content and sender information provides the incentive for the selfish nodes to remain truthful in the network.  ... 
doi:10.1109/jproc.2011.2169033 fatcat:qqrflfnnxnho5f7odt726lkykm

A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks

Behrouz Jedari, Feng Xia, Zhaolong Ning
2018 IEEE Communications Surveys and Tutorials  
node detection and defense systems, and (4) incentive mechanisms.  ...  In this paper, we present an in-depth survey on human-centric communication challenges and solutions in the non-cooperative WRNs that focuses on: (1) an overview of the non-cooperative WRNs and introduction  ...  The authors are grateful to the anonymous reviewers for their constructive comments and suggestions to improve the quality of the article.  ... 
doi:10.1109/comst.2018.2791428 fatcat:2v6odowj4rhx5ico7g2i4pk6ne

Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Dong In Kim, Zhu Han
2016 arXiv   pre-print
This paper provides a state-of-the-art literature review on economic analysis and pricing models for data collection and wireless communication in Internet of Things (IoT).  ...  Besides, we survey a variety of pricing strategies in providing incentives for phone users in crowdsensing applications to contribute their sensing data.  ...  This indicates that incentive mechanisms are very important in privacy-aware participatory sensing systems.  ... 
arXiv:1608.03475v1 fatcat:2jjbf3bw2vai5kqi74r56dviwe

Learning to Design Fair and Private Voting Rules

Farhad Mohsin, Ao Liu, Pin-Yu Chen, Francesca Rossi, Lirong Xia
2022 The Journal of Artificial Intelligence Research  
Voting is used widely to identify a collective decision for a group of agents, based on their preferences.  ...  In this paper, we focus on evaluating and designing voting rules that support both the privacy of the voting agents and a notion of fairness over such agents.  ...  Acknowledgments The authors are grateful to Michael Hind for discussions and the reviewers for their insightful comments and suggestions.  ... 
doi:10.1613/jair.1.13734 fatcat:wfx7auizlfdmlcjydisrzwy6om
« Previous Showing results 1 — 15 out of 1,544 results