[[abstract]]Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens for large-scale sensing by various mobile devices to efficiently collect and share local information. Unlike other MCS application challenges that consider user privacy and data trustworthiness, this study focuses on the network trustworthiness problem, namely Sybil attacks in MCS network. The Sybil attack in computer security is a type of security attacks, which illegally forge multiple identities in peer-to-peer networks, namely Sybil identities. These Sybil identities will falsify multiple identities to negatively influence to reduce the effectiveness of sensing data in this MCS network or degrading entire network performance. To cope with t...
Abstract—The growing intelligence and popularity of smart-phones and the advances in Mobile Ubiquito...
Crowd-sourced mobile embedded systems allow people to contribute sensor data, for critical applicati...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens for large-scal...
[[abstract]]Participatory sensing is an innovative model in mobile sensing network which allows volu...
[[abstract]]Participatory sensing is a revolutionary paradigm in which volunteers collect and share ...
Participatory sensing is a revolutionary paradigm in which volunteers collect and share information ...
In this paper, we propose a Social-based Mobile Sybil Detection (SMSD) scheme to detect Sybil attack...
Large scale systems face security threads from faulty or hostile remote computing elements. Portable...
Recent advances in sensing, computing, and networking have paved the way for the emerging paradigm o...
In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. ...
Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack ...
Digital Object Identifier 10.1109/ACCESS.2020.2968797With the rapid development of mobile technology...
The broad capabilities of current mobile devices have paved the way forMobile Crowd Sensing (MCS) ap...
Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, comp...
Abstract—The growing intelligence and popularity of smart-phones and the advances in Mobile Ubiquito...
Crowd-sourced mobile embedded systems allow people to contribute sensor data, for critical applicati...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...
Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens for large-scal...
[[abstract]]Participatory sensing is an innovative model in mobile sensing network which allows volu...
[[abstract]]Participatory sensing is a revolutionary paradigm in which volunteers collect and share ...
Participatory sensing is a revolutionary paradigm in which volunteers collect and share information ...
In this paper, we propose a Social-based Mobile Sybil Detection (SMSD) scheme to detect Sybil attack...
Large scale systems face security threads from faulty or hostile remote computing elements. Portable...
Recent advances in sensing, computing, and networking have paved the way for the emerging paradigm o...
In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. ...
Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack ...
Digital Object Identifier 10.1109/ACCESS.2020.2968797With the rapid development of mobile technology...
The broad capabilities of current mobile devices have paved the way forMobile Crowd Sensing (MCS) ap...
Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, comp...
Abstract—The growing intelligence and popularity of smart-phones and the advances in Mobile Ubiquito...
Crowd-sourced mobile embedded systems allow people to contribute sensor data, for critical applicati...
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to...