Skip to main content

2019 | OriginalPaper | Buchkapitel

7. Connecting Human to Physical-World: Security and Privacy Issues in Mobile Crowdsensing

verfasst von : Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang

Erschienen in: Security and Privacy for Next-Generation Wireless Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the advantages of IoT technology and applications, wireless signals are becoming more pervasive than ever. Human activities and experiences could be recognized by wireless network. There is a need to connect human to pervasive wireless network and interplay with them. Nevertheless, security and privacy issues become vitally important when humans are involved. Typically, inertial sensors and communication channels could be substantial privacy leakage sources, where information about inherent human features and behaviors are of tremendous importance in today’s research and study.
In this chapter, we introduce the security and privacy issues related to this innovative processing paradigm, where participants are connecting to the cyber world and playing an important role for pervasive applications. This chapter focuses on mobile crowdsensing scenario, where human activity could be recognized when she/he is involved in mobile crowdsensing activity. Mobile crowdsensing activities are participatory oriented, because human activities as well as human behavior are considered and processed with the core of wireless network design. We organize the state of art researches and the corresponding challenges to formally address the participatory wireless processing research issues. Some innovative concepts are also introduced with the specific wireless processing techniques. In the end, we summarize the participatory wireless processing with some research directions and future work.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Adib, F., Hsu, C.Y., Mao, H., Katabi, D., Durand, F.: Capturing the human figure through a wall. Acm Transactions on Graphics 34(6), 1–13 (2015)CrossRef Adib, F., Hsu, C.Y., Mao, H., Katabi, D., Durand, F.: Capturing the human figure through a wall. Acm Transactions on Graphics 34(6), 1–13 (2015)CrossRef
5.
Zurück zum Zitat Adib, F., Kabelac, Z., Katabi, D.: Multi-person localization via rf body reflections. In: Usenix Conference on Networked Systems Design and Implementation, pp. 279–292 (2015) Adib, F., Kabelac, Z., Katabi, D.: Multi-person localization via rf body reflections. In: Usenix Conference on Networked Systems Design and Implementation, pp. 279–292 (2015)
6.
Zurück zum Zitat Adib, F., Kabelac, Z., Katabi, D., Miller, R.C.: 3d tracking via body radio reflections pp. 317–329 (2013) Adib, F., Kabelac, Z., Katabi, D., Miller, R.C.: 3d tracking via body radio reflections pp. 317–329 (2013)
7.
Zurück zum Zitat Adib, F., Katabi, D.: See through walls with wifi! Computer Communication Review 43(4), 75–86 (2013)CrossRef Adib, F., Katabi, D.: See through walls with wifi! Computer Communication Review 43(4), 75–86 (2013)CrossRef
8.
Zurück zum Zitat Ali, K., Liu, A.X., Wang, W., Shahzad, M.: Keystroke recognition using wifi signals. In: International Conference on Mobile Computing and NETWORKING, pp. 90–102 (2015) Ali, K., Liu, A.X., Wang, W., Shahzad, M.: Keystroke recognition using wifi signals. In: International Conference on Mobile Computing and NETWORKING, pp. 90–102 (2015)
9.
Zurück zum Zitat Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp. 1–6. ACM (2013) Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp. 1–6. ACM (2013)
10.
Zurück zum Zitat Azizyan, M., Constandache, I., Choudhury, R.R.: Surroundsense:mobile phone localization via ambience fingerprinting. pp. 261–272 (2009) Azizyan, M., Constandache, I., Choudhury, R.R.: Surroundsense:mobile phone localization via ambience fingerprinting. pp. 261–272 (2009)
11.
Zurück zum Zitat Cao, C.C., She, J., Tong, Y., Chen, L.: Whom to ask?: jury selection for decision making tasks on micro-blog services. Proceedings of the VLDB Endowment 5(11), 1495–1506 (2012)CrossRef Cao, C.C., She, J., Tong, Y., Chen, L.: Whom to ask?: jury selection for decision making tasks on micro-blog services. Proceedings of the VLDB Endowment 5(11), 1495–1506 (2012)CrossRef
12.
Zurück zum Zitat Celis, L.E., Dasgupta, K., Rajan, V.: Adaptive crowdsourcing for temporal crowds. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 1093–1100. ACM (2013) Celis, L.E., Dasgupta, K., Rajan, V.: Adaptive crowdsourcing for temporal crowds. In: Proceedings of the 22nd International Conference on World Wide Web, pp. 1093–1100. ACM (2013)
13.
Zurück zum Zitat Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 13–28. Springer (2002) Chari, S., Rao, J.R., Rohatgi, P.: Template attacks. In: International Workshop on Cryptographic Hardware and Embedded Systems, pp. 13–28. Springer (2002)
14.
Zurück zum Zitat Cidon, A., Nagaraj, K., Katti, S., Viswanath, P.: Flashback: Decoupled lightweight wireless control. In: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, pp. 223–234. ACM (2012) Cidon, A., Nagaraj, K., Katti, S., Viswanath, P.: Flashback: Decoupled lightweight wireless control. In: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, pp. 223–234. ACM (2012)
15.
Zurück zum Zitat Du, H., Yang, P., Li, P., Luo, G.: Wordrecorder: Accurate acoustic-based handwriting recognition using deep learning. In: Infocomp (2017) Du, H., Yang, P., Li, P., Luo, G.: Wordrecorder: Accurate acoustic-based handwriting recognition using deep learning. In: Infocomp (2017)
16.
Zurück zum Zitat Fan, X., Yang, P., Li, Q.: Fairness counts: Simple task allocation scheme for balanced crowdsourcing networks. In: Mobile Ad-hoc and Sensor Networks (MSN), 2015 11th International Conference on, pp. 258–263. IEEE (2015) Fan, X., Yang, P., Li, Q.: Fairness counts: Simple task allocation scheme for balanced crowdsourcing networks. In: Mobile Ad-hoc and Sensor Networks (MSN), 2015 11th International Conference on, pp. 258–263. IEEE (2015)
17.
Zurück zum Zitat Fan, X., Yang, P., Li, Q., Liu, D., Xiang, C., Zhao, Y.: Safe-crowd: secure task allocation for collaborative mobile social network. Security and Communication Networks 9(15), 2686–2695 (2016)CrossRef Fan, X., Yang, P., Li, Q., Liu, D., Xiang, C., Zhao, Y.: Safe-crowd: secure task allocation for collaborative mobile social network. Security and Communication Networks 9(15), 2686–2695 (2016)CrossRef
18.
Zurück zum Zitat Goel, G., Nikzad, A., Singla, A.: Allocating tasks to workers with matching constraints: truthful mechanisms for crowdsourcing markets. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 279–280. ACM (2014) Goel, G., Nikzad, A., Singla, A.: Allocating tasks to workers with matching constraints: truthful mechanisms for crowdsourcing markets. In: Proceedings of the 23rd International Conference on World Wide Web, pp. 279–280. ACM (2014)
19.
Zurück zum Zitat Guo, B., Wang, Z., Yu, Z., Wang, Y., Yen, N.Y., Huang, R., Zhou, X.: Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm. ACM Computing Surveys (CSUR) 48(1), 7 (2015)CrossRef Guo, B., Wang, Z., Yu, Z., Wang, Y., Yen, N.Y., Huang, R., Zhou, X.: Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm. ACM Computing Surveys (CSUR) 48(1), 7 (2015)CrossRef
20.
Zurück zum Zitat Han, J., Owusu, E., Le, T.N., Perrig, A., Zhang, J.: Accomplice: Location inference using accelerometers on smartphones. In: Fourth International Conference on Communication Systems and Networks, pp. 1–9 (2012) Han, J., Owusu, E., Le, T.N., Perrig, A., Zhang, J.: Accomplice: Location inference using accelerometers on smartphones. In: Fourth International Conference on Communication Systems and Networks, pp. 1–9 (2012)
21.
Zurück zum Zitat Huangfu, S., Guo, B., Yu, Z., Li, D.: Using the model of markets with intermediaries as an incentive scheme for opportunistic social networks. In: Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp. 142–149. IEEE (2013) Huangfu, S., Guo, B., Yu, Z., Li, D.: Using the model of markets with intermediaries as an incentive scheme for opportunistic social networks. In: Ubiquitous Intelligence and Computing, 2013 IEEE 10th International Conference on and 10th International Conference on Autonomic and Trusted Computing (UIC/ATC), pp. 142–149. IEEE (2013)
22.
Zurück zum Zitat Jain, R., Chiu, D.M., Hawe, W.R.: A quantitative measure of fairness and discrimination for resource allocation in shared computer system, vol. 38. Eastern Research Laboratory, Digital Equipment Corporation Hudson, MA (1984) Jain, R., Chiu, D.M., Hawe, W.R.: A quantitative measure of fairness and discrimination for resource allocation in shared computer system, vol. 38. Eastern Research Laboratory, Digital Equipment Corporation Hudson, MA (1984)
23.
Zurück zum Zitat Ji, X., Wang, J., Liu, M., Yan, Y., Yang, P., Liu, Y.: Hitchhike: Riding control on preambles. In: INFOCOM, 2014 Proceedings IEEE, pp. 2499–2507. IEEE (2014) Ji, X., Wang, J., Liu, M., Yan, Y., Yang, P., Liu, Y.: Hitchhike: Riding control on preambles. In: INFOCOM, 2014 Proceedings IEEE, pp. 2499–2507. IEEE (2014)
24.
Zurück zum Zitat Khan, W.Z., Xiang, Y., Aalsalem, M.Y., Arshad, Q.: Mobile phone sensing systems: A survey. IEEE Communications Surveys & Tutorials 15(1), 402–427 (2013)CrossRef Khan, W.Z., Xiang, Y., Aalsalem, M.Y., Arshad, Q.: Mobile phone sensing systems: A survey. IEEE Communications Surveys & Tutorials 15(1), 402–427 (2013)CrossRef
25.
Zurück zum Zitat Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Annual International Cryptology Conference, pp. 104–113. Springer (1996) Kocher, P.C.: Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems. In: Annual International Cryptology Conference, pp. 104–113. Springer (1996)
26.
Zurück zum Zitat Le, T.H., Clédière, J., Servière, C., Lacoume, J.L.: Noise reduction in side channel attack using fourth-order cumulant. IEEE Transactions on Information Forensics and Security 2(4), 710–720 (2007)CrossRef Le, T.H., Clédière, J., Servière, C., Lacoume, J.L.: Noise reduction in side channel attack using fourth-order cumulant. IEEE Transactions on Information Forensics and Security 2(4), 710–720 (2007)CrossRef
27.
Zurück zum Zitat Malik, H.: Acoustic environment identification and its applications to audio forensics. Information Forensics and Security IEEE Transactions on 8(11), 1827–1837 (2013)CrossRef Malik, H.: Acoustic environment identification and its applications to audio forensics. Information Forensics and Security IEEE Transactions on 8(11), 1827–1837 (2013)CrossRef
28.
Zurück zum Zitat Manogajapathi, V., Loganathan, J., Sekhar, R.V.: Detecting camera based traitor and fraudulent apps on smartphone. In: Futuristic Trends in Research and Innovation for Social Welfare (2016) Manogajapathi, V., Loganathan, J., Sekhar, R.V.: Detecting camera based traitor and fraudulent apps on smartphone. In: Futuristic Trends in Research and Innovation for Social Welfare (2016)
29.
Zurück zum Zitat Mehrnezhad, M., Toreini, E., Shahandashti, S.F., Hao, F.: Stealing pins via mobile sensors: actual risk versus user perception. International Journal of Information Security 17(3), 291–313 (2016)CrossRef Mehrnezhad, M., Toreini, E., Shahandashti, S.F., Hao, F.: Stealing pins via mobile sensors: actual risk versus user perception. International Journal of Information Security 17(3), 291–313 (2016)CrossRef
30.
Zurück zum Zitat Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE transactions on computers 51(5), 541–552 (2002)MathSciNetCrossRef Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Examining smart-card security under the threat of power analysis attacks. IEEE transactions on computers 51(5), 541–552 (2002)MathSciNetCrossRef
31.
Zurück zum Zitat Narain, S., Sanatinia, A., Noubir, G.: Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning. In: Proceedings of the 2014 ACM conference on Security and privacy in wireless and mobile networks, pp. 201–212 (2014) Narain, S., Sanatinia, A., Noubir, G.: Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning. In: Proceedings of the 2014 ACM conference on Security and privacy in wireless and mobile networks, pp. 201–212 (2014)
32.
Zurück zum Zitat Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: The perils of user tracking using zero-permission mobile apps. IEEE Security and Privacy 15(2), 32–41 (2017)CrossRef Narain, S., Vo-Huu, T.D., Block, K., Noubir, G.: The perils of user tracking using zero-permission mobile apps. IEEE Security and Privacy 15(2), 32–41 (2017)CrossRef
33.
Zurück zum Zitat Olejnik, L.: Report on sensors apis: privacy and transparency perspective (2016) Olejnik, L.: Report on sensors apis: privacy and transparency perspective (2016)
34.
Zurück zum Zitat Qifan, Gupta, Sidhant, Gollakota, Shyamnath, Patel, Shwetak: Whole-home gesture recognition using wireless signals. Computer Communication Review 43(4), 485–486 (2013) Qifan, Gupta, Sidhant, Gollakota, Shyamnath, Patel, Shwetak: Whole-home gesture recognition using wireless signals. Computer Communication Review 43(4), 485–486 (2013)
35.
Zurück zum Zitat Rana, R.K., Chou, C.T., Kanhere, S.S., Bulusu, N., Hu, W.: Ear-phone: an end-to-end participatory urban noise mapping system. In: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, pp. 105–116. ACM (2010) Rana, R.K., Chou, C.T., Kanhere, S.S., Bulusu, N., Hu, W.: Ear-phone: an end-to-end participatory urban noise mapping system. In: Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, pp. 105–116. ACM (2010)
36.
Zurück zum Zitat Sheng, X., Tang, J., Zhang, W.: Energy-efficient collaborative sensing with mobile phones. In: INFOCOM, 2012 Proceedings IEEE, pp. 1916–1924. IEEE (2012) Sheng, X., Tang, J., Zhang, W.: Energy-efficient collaborative sensing with mobile phones. In: INFOCOM, 2012 Proceedings IEEE, pp. 1916–1924. IEEE (2012)
37.
Zurück zum Zitat Shih, C.F., Sivakumar, R.: Switch: Enabling transmitter and receiver participation in seamless lightweight control. In: INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, pp. 1–9. IEEE (2017) Shih, C.F., Sivakumar, R.: Switch: Enabling transmitter and receiver participation in seamless lightweight control. In: INFOCOM 2017-IEEE Conference on Computer Communications, IEEE, pp. 1–9. IEEE (2017)
38.
Zurück zum Zitat Su, M.K., Li, Y., Petal, K., Grace, M.: Attacking android smartphone systems without permissions. In: Privacy, Security and Trust, pp. 147–156 (2017) Su, M.K., Li, Y., Petal, K., Grace, M.: Attacking android smartphone systems without permissions. In: Privacy, Security and Trust, pp. 147–156 (2017)
39.
Zurück zum Zitat Tan, R., Xing, G., Wang, J., So, H.C.: Exploiting reactive mobility for collaborative target detection in wireless sensor networks. IEEE Transactions on Mobile Computing 9(3), 317–332 (2010)CrossRef Tan, R., Xing, G., Wang, J., So, H.C.: Exploiting reactive mobility for collaborative target detection in wireless sensor networks. IEEE Transactions on Mobile Computing 9(3), 317–332 (2010)CrossRef
40.
Zurück zum Zitat Tran-Thanh, L., Stein, S., Rogers, A., Jennings, N.R.: Efficient crowdsourcing of unknown experts using bounded multi-armed bandits. Artificial Intelligence 214, 89–111 (2014)MathSciNetCrossRef Tran-Thanh, L., Stein, S., Rogers, A., Jennings, N.R.: Efficient crowdsourcing of unknown experts using bounded multi-armed bandits. Artificial Intelligence 214, 89–111 (2014)MathSciNetCrossRef
41.
Zurück zum Zitat Uddin, M.Y.S., Wang, H., Saremi, F., Qi, G.J., Abdelzaher, T., Huang, T.: Photonet: a similarity-aware picture delivery service for situation awareness. In: Real-Time Systems Symposium (RTSS), 2011 IEEE 32nd, pp. 317–326. IEEE (2011) Uddin, M.Y.S., Wang, H., Saremi, F., Qi, G.J., Abdelzaher, T., Huang, T.: Photonet: a similarity-aware picture delivery service for situation awareness. In: Real-Time Systems Symposium (RTSS), 2011 IEEE 32nd, pp. 317–326. IEEE (2011)
42.
Zurück zum Zitat Wang, D., Abdelzaher, T., Ahmadi, H., Pasternack, J., Roth, D., Gupta, M., Han, J., Fatemieh, O., Le, H., Aggarwal, C.C.: On bayesian interpretation of fact-finding in information networks. In: Information Fusion (FUSION), 2011 Proceedings of the 14th International Conference on, pp. 1–8. IEEE (2011) Wang, D., Abdelzaher, T., Ahmadi, H., Pasternack, J., Roth, D., Gupta, M., Han, J., Fatemieh, O., Le, H., Aggarwal, C.C.: On bayesian interpretation of fact-finding in information networks. In: Information Fusion (FUSION), 2011 Proceedings of the 14th International Conference on, pp. 1–8. IEEE (2011)
43.
Zurück zum Zitat Wang, D., Abdelzaher, T., Kaplan, L., Aggarwal, C.C.: On quantifying the accuracy of maximum likelihood estimation of participant reliability in social sensing. Urbana 51, 61,801 (2011) Wang, D., Abdelzaher, T., Kaplan, L., Aggarwal, C.C.: On quantifying the accuracy of maximum likelihood estimation of participant reliability in social sensing. Urbana 51, 61,801 (2011)
44.
Zurück zum Zitat Wang, D., Kaplan, L., Abdelzaher, T., Aggarwal, C.C.: On scalability and robustness limitations of real and asymptotic confidence bounds in social sensing. In: Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012 9th Annual IEEE Communications Society Conference on, pp. 506–514. IEEE (2012) Wang, D., Kaplan, L., Abdelzaher, T., Aggarwal, C.C.: On scalability and robustness limitations of real and asymptotic confidence bounds in social sensing. In: Sensor, Mesh and Ad Hoc Communications and Networks (SECON), 2012 9th Annual IEEE Communications Society Conference on, pp. 506–514. IEEE (2012)
45.
Zurück zum Zitat Wang, D., Kaplan, L., Abdelzaher, T., Aggarwal, C.C.: On credibility estimation tradeoffs in assured social sensing. IEEE Journal on Selected Areas in Communications 31(6), 1026–1037 (2013)CrossRef Wang, D., Kaplan, L., Abdelzaher, T., Aggarwal, C.C.: On credibility estimation tradeoffs in assured social sensing. IEEE Journal on Selected Areas in Communications 31(6), 1026–1037 (2013)CrossRef
46.
Zurück zum Zitat Wang, D., Kaplan, L., Le, H., Abdelzaher, T.: On truth discovery in social sensing: A maximum likelihood estimation approach. In: Proceedings of the 11th international conference on Information Processing in Sensor Networks, pp. 233–244. ACM (2012) Wang, D., Kaplan, L., Le, H., Abdelzaher, T.: On truth discovery in social sensing: A maximum likelihood estimation approach. In: Proceedings of the 11th international conference on Information Processing in Sensor Networks, pp. 233–244. ACM (2012)
47.
Zurück zum Zitat Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.M.: We can hear you with wi-fi! pp. 593–604 (2014) Wang, G., Zou, Y., Zhou, Z., Wu, K., Ni, L.M.: We can hear you with wi-fi! pp. 593–604 (2014)
48.
Zurück zum Zitat Wang, H., Lai, T.T., Choudhury, R.R.: Mole: Motion leaks through smartwatch sensors. In: International Conference on Mobile Computing and NETWORKING, pp. 155–166 (2015) Wang, H., Lai, T.T., Choudhury, R.R.: Mole: Motion leaks through smartwatch sensors. In: International Conference on Mobile Computing and NETWORKING, pp. 155–166 (2015)
49.
Zurück zum Zitat Wang, J., Vasisht, D., Katabi, D.: Rf-idraw: virtual touch screen in the air using rf signals. In: ACM Conference on SIGCOMM, pp. 235–246 (2014)CrossRef Wang, J., Vasisht, D., Katabi, D.: Rf-idraw: virtual touch screen in the air using rf signals. In: ACM Conference on SIGCOMM, pp. 235–246 (2014)CrossRef
50.
Zurück zum Zitat Wu, F., Meng, T., Li, A., Chen, G., Vaidya, N.H.: Have you recorded my voice: Toward robust neighbor discovery in mobile wireless networks. IEEE/ACM Transactions on Networking (2018) Wu, F., Meng, T., Li, A., Chen, G., Vaidya, N.H.: Have you recorded my voice: Toward robust neighbor discovery in mobile wireless networks. IEEE/ACM Transactions on Networking (2018)
51.
Zurück zum Zitat Wu, K., Tan, H., Liu, Y., Zhang, J., Zhang, Q., Ni, L.M.: Side channel: Bits over interference. IEEE Transactions on Mobile Computing 11(8), 1317–1330 (2012)CrossRef Wu, K., Tan, H., Liu, Y., Zhang, J., Zhang, Q., Ni, L.M.: Side channel: Bits over interference. IEEE Transactions on Mobile Computing 11(8), 1317–1330 (2012)CrossRef
52.
Zurück zum Zitat Xiang, C., Yang, P., Tian, C., Cai, H., Liu, Y.: Calibrate without calibrating: An iterative approach in participatory sensing network. IEEE Transactions on Parallel and Distributed Systems 26(2), 351–361 (2015)CrossRef Xiang, C., Yang, P., Tian, C., Cai, H., Liu, Y.: Calibrate without calibrating: An iterative approach in participatory sensing network. IEEE Transactions on Parallel and Distributed Systems 26(2), 351–361 (2015)CrossRef
53.
Zurück zum Zitat Xiang, C., Yang, P., Tian, C., Yan, Y., Wu, X., Liu, Y.: Passfit: Participatory sensing and filtering for identifying truthful urban pollution sources. IEEE sensors journal 13(10), 3721–3732 (2013)CrossRef Xiang, C., Yang, P., Tian, C., Yan, Y., Wu, X., Liu, Y.: Passfit: Participatory sensing and filtering for identifying truthful urban pollution sources. IEEE sensors journal 13(10), 3721–3732 (2013)CrossRef
54.
Zurück zum Zitat Xiang, C., Yang, P., Tian, C., Zhang, L., Lin, H., Xiao, F., Zhang, M., Liu, Y.: Carm: crowd-sensing accurate outdoor rss maps with error-prone smartphone measurements. IEEE Transactions on Mobile Computing 15(11), 2669–2681 (2016)CrossRef Xiang, C., Yang, P., Tian, C., Zhang, L., Lin, H., Xiao, F., Zhang, M., Liu, Y.: Carm: crowd-sensing accurate outdoor rss maps with error-prone smartphone measurements. IEEE Transactions on Mobile Computing 15(11), 2669–2681 (2016)CrossRef
55.
Zurück zum Zitat Xiang, C., Yang, P., Wu, X., He, H., Wang, B., Liu, Y.: istep: A step-aware sampling approach for diffusion profiling in mobile sensor networks. IEEE Transactions on Vehicular Technology 65(10), 8616–8628 (2016) Xiang, C., Yang, P., Wu, X., He, H., Wang, B., Liu, Y.: istep: A step-aware sampling approach for diffusion profiling in mobile sensor networks. IEEE Transactions on Vehicular Technology 65(10), 8616–8628 (2016)
56.
Zurück zum Zitat Xiang, C., Yang, P., Wu, X., He, H., Xiao, S.: Qos-based service selection with lightweight description for large-scale service-oriented internet of things. Tsinghua Science and Technology 20(4), 336–347 (2015)CrossRef Xiang, C., Yang, P., Wu, X., He, H., Xiao, S.: Qos-based service selection with lightweight description for large-scale service-oriented internet of things. Tsinghua Science and Technology 20(4), 336–347 (2015)CrossRef
57.
Zurück zum Zitat Xing, G., Wang, J., Yuan, Z., Tan, R., Sun, L., Huang, Q., Jia, X., So, H.C.: Mobile scheduling for spatiotemporal detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 21(12), 1851–1866 (2010)CrossRef Xing, G., Wang, J., Yuan, Z., Tan, R., Sun, L., Huang, Q., Jia, X., So, H.C.: Mobile scheduling for spatiotemporal detection in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 21(12), 1851–1866 (2010)CrossRef
58.
Zurück zum Zitat Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In: Proceedings of the 18th annual international conference on Mobile computing and networking, pp. 173–184. ACM (2012) Yang, D., Xue, G., Fang, X., Tang, J.: Crowdsourcing to smartphones: Incentive mechanism design for mobile phone sensing. In: Proceedings of the 18th annual international conference on Mobile computing and networking, pp. 173–184. ACM (2012)
59.
Zurück zum Zitat Yang, L., Lin, Q., Li, X., Liu, T., Liu, Y.: See through walls with cots rfid system! In: International Conference on Mobile Computing and NETWORKING, pp. 487–499 (2015) Yang, L., Lin, Q., Li, X., Liu, T., Liu, Y.: See through walls with cots rfid system! In: International Conference on Mobile Computing and NETWORKING, pp. 487–499 (2015)
60.
Zurück zum Zitat Yu, T., Jin, H., Nahrstedt, K.: Writinghacker:audio based eavesdropping of handwriting via mobile devices. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 463–473 (2016) Yu, T., Jin, H., Nahrstedt, K.: Writinghacker:audio based eavesdropping of handwriting via mobile devices. In: ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp. 463–473 (2016)
61.
Zurück zum Zitat Yun, S., Chen, Y.C., Qiu, L.: Turning a mobile device into a mouse in the air. In: International Conference on Mobile Systems, Applications, and Services, pp. 15–29 (2015) Yun, S., Chen, Y.C., Qiu, L.: Turning a mobile device into a mouse in the air. In: International Conference on Mobile Systems, Applications, and Services, pp. 15–29 (2015)
62.
Zurück zum Zitat Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., Xu, W.: Dolphinattack: Inaudible voice commands. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 103–117. ACM (2017) Zhang, G., Yan, C., Ji, X., Zhang, T., Zhang, T., Xu, W.: Dolphinattack: Inaudible voice commands. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 103–117. ACM (2017)
63.
Zurück zum Zitat Zhang, M., Dai, Q., Yang, P., Xiong, J., Tian, C., Xiang, C.: idial: Enabling a virtual dial plate on the hand back for around-device interaction. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2(1), 55 (2018) Zhang, M., Dai, Q., Yang, P., Xiong, J., Tian, C., Xiang, C.: idial: Enabling a virtual dial plate on the hand back for around-device interaction. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2(1), 55 (2018)
64.
Zurück zum Zitat Zhang, M., Yang, P., Tian, C., Tang, S., Gao, X., Wang, B., Xiao, F.: Quality-aware sensing coverage in budget-constrained mobile crowdsensing networks. IEEE Transactions on Vehicular Technology 65(9), 7698–7707 (2016)CrossRef Zhang, M., Yang, P., Tian, C., Tang, S., Gao, X., Wang, B., Xiao, F.: Quality-aware sensing coverage in budget-constrained mobile crowdsensing networks. IEEE Transactions on Vehicular Technology 65(9), 7698–7707 (2016)CrossRef
65.
Zurück zum Zitat Zhang, X., Yang, Z., Wu, C., Sun, W., Liu, Y., Xing, K.: Robust trajectory estimation for crowdsourcing-based mobile applications. IEEE Transactions on Parallel and Distributed Systems 25(7), 1876–1885 (2014)CrossRef Zhang, X., Yang, Z., Wu, C., Sun, W., Liu, Y., Xing, K.: Robust trajectory estimation for crowdsourcing-based mobile applications. IEEE Transactions on Parallel and Distributed Systems 25(7), 1876–1885 (2014)CrossRef
66.
Zurück zum Zitat Zhao, M., Li, T., Abu Alsheikh, M., Tian, Y., Zhao, H., Torralba, A., Katabi, D.: Through-wall human pose estimation using radio signals. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7356–7365 (2018) Zhao, M., Li, T., Abu Alsheikh, M., Tian, Y., Zhao, H., Torralba, A., Katabi, D.: Through-wall human pose estimation using radio signals. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7356–7365 (2018)
67.
Zurück zum Zitat Zhu, T., Ma, Q., Zhang, S., Liu, Y.: Context-free attacks using keyboard acoustic emanations. In: ACM Sigsac Conference on Computer and Communications Security, pp. 453–464 (2014) Zhu, T., Ma, Q., Zhang, S., Liu, Y.: Context-free attacks using keyboard acoustic emanations. In: ACM Sigsac Conference on Computer and Communications Security, pp. 453–464 (2014)
68.
Zurück zum Zitat Zhu, Y., Zhu, Y., Zhao, B.Y., Zheng, H.: Reusing 60ghz radios for mobile radar imaging. In: International Conference on Mobile Computing & Networking, pp. 103–116 (2015) Zhu, Y., Zhu, Y., Zhao, B.Y., Zheng, H.: Reusing 60ghz radios for mobile radar imaging. In: International Conference on Mobile Computing & Networking, pp. 103–116 (2015)
Metadaten
Titel
Connecting Human to Physical-World: Security and Privacy Issues in Mobile Crowdsensing
verfasst von
Sheng Zhong
Hong Zhong
Xinyi Huang
Panlong Yang
Jin Shi
Lei Xie
Kun Wang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-01150-5_7

Premium Partner