Filters








160 Hits in 5.3 sec

Editorial: Special issue on security and privacy in network computing

Hua Wang, Yongzhi Wang, Tarek Taleb, Xiaohong Jiang
2019 World wide web (Bussum)  
computing architectures and created a wide range of network computing paradigms, including blockchain [1], distributed computing [11], cloud computing [9], Web services [2], Internet of Things [4, 10], crowdsourcing  ...  On the other hand, the diversity and the unique characteristics of network computing paradigms make a silver bullet for the general solution difficult to seek.  ...  Acknowledgements The guest editors would like to express their thanks to the Editor in Chief Professor Yanchun Zhang for giving them the opportunity to edit this special issue on "Security and Privacy  ... 
doi:10.1007/s11280-019-00704-x fatcat:vj64c2lpgzherhpsiqgjzjtzla

Privacy-Aware Crowdsourced Spectrum Sensing and Multi-user Sharing Mechanism in Dynamic Spectrum Access Networks

Xiaohui Li, Qi Zhu, Xianbin Wang
2019 IEEE Access  
In this paper, aiming at achieving a maximal spectrum utilization, we propose a privacy-aware crowdsourced spectrum sensing and multi-user sharing mechanism for DSA.  ...  INDEX TERMS Privacy aware, mobile crowd sensing, incentive mechanism, dynamic spectrum access, game theory.  ...  PRIVACY-AWARE CROWDSOURCED SPECTRUM SENSING MECHANISM In our proposed crowdsourced spectrum sensing model, aiming at preserving privacy, each sensing helper j will firstly form a sensing group with at  ... 
doi:10.1109/access.2019.2901200 fatcat:pqdbmjeluzemtfayqfufkzlorm

Differential Privacy in Cognitive Radio Networks: A Comprehensive Survey [article]

Muneeb Ul Hassan, Mubashir Husain Rehmani, Maaz Rehan, Jinjun Chen
2021 arXiv   pre-print
Background/Introduction: Integrating cognitive radio (CR) with traditional wireless networks is helping solve the problem of spectrum scarcity in an efficient manner.  ...  The opportunistic and dynamic spectrum access features of CR provide the functionality to its unlicensed users to utilize the underutilized spectrum at the time of need because CR nodes can sense vacant  ...  Authors developed a multi-bid model which collects bids from sensing participants and selects sensing winners in differentially private manner.  ... 
arXiv:2111.02011v2 fatcat:a5hique4fvfxrclslvpgda5jyy

Location Privacy in Cognitive Radio Networks: A Survey

Mohamed Grissa, Bechir Hamdaoui, Attila A. Yavuza
2017 IEEE Communications Surveys and Tutorials  
Cognitive radio networks (CRNs) have emerged as an essential technology to enable dynamic and opportunistic spectrum access which aims to exploit underutilized licensed channels to solve the spectrum scarcity  ...  , and explores the different privacy attacks and countermeasure solutions that have been proposed in the literature to cope with this location privacy issue.  ...  Location privacy for crowdsourced spectrum sensing: Crowdsourcing is an emerging tool that is gaining lots of interest in the context of CRN s.  ... 
doi:10.1109/comst.2017.2693965 fatcat:4jkyw7tyxrcdzbbm5uocxawsie

Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey [article]

Nguyen Cong Luong, Dinh Thai Hoang, Ping Wang, Dusit Niyato, Dong In Kim, Zhu Han
2016 arXiv   pre-print
Besides, we survey a variety of pricing strategies in providing incentives for phone users in crowdsensing applications to contribute their sensing data.  ...  This paper provides a state-of-the-art literature review on economic analysis and pricing models for data collection and wireless communication in Internet of Things (IoT).  ...  Thus, using pricing models may provide incentive mechanisms for users' privacy protection. A.  ... 
arXiv:1608.03475v1 fatcat:2jjbf3bw2vai5kqi74r56dviwe

Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications

Kenneth Li Minn Ang, Jasmine Kah Phooi Seng, Ericmoore Ngharamike
2022 Future Internet  
Crowdsourcing can play an important role in the Internet of Things (IoT) applications for information sensing and gathering where the participants are equipped with geolocated devices.  ...  This paper presents a comprehensive survey for this new Crowdsourcing IoT paradigm from four different perspectives: (1) Architectures for Crowd-IoT; (2) Trustworthy, Privacy and Security for Crowd-IoT  ...  The authors presented AnonySense, a general architecture focusing on privacy-aware mobile crowdsourcing.  ... 
doi:10.3390/fi14020049 fatcat:o62tjaayyvfnjc75irzkpzu5vy

A survey on game theoretical methods in Human–Machine Networks

Xueqin Liang, Zheng Yan
2017 Future generations computer systems  
Designing incentive mechanisms is an effective and efficiency way to achieve different purposes. Most of existing incentive mechanisms for crowdsourcing depends on monetary rewards.  ...  [49] proposed an incentive mechanism based on game theory to solve this problem. It can promote players to act honestly.  ... 
doi:10.1016/j.future.2017.10.051 fatcat:55v7cpi64ndb3apj4ngbkin5ue

Game Theory in Mobile CrowdSensing:A Comprehensive Survey

Venkat Surya Dasari, Burak Kantarci, Maryam Pouryazdan, Luca Foschini, Michele Girolami
2020 Sensors  
We present the methods used by each game to reach an equilibrium where the solution for the problem ensures that every participant of the game is satisfied with their utility with no requirement of change  ...  requesters and providers, and incentives.  ...  [110] proposed an incentive mechanism based on the time stamp of joining in sensing task.  ... 
doi:10.3390/s20072055 pmid:32268546 pmcid:PMC7180814 fatcat:jahw2lzp4re7dim5q4onf6tlzm

Adopting incentive mechanisms for large-scale participation in mobile crowdsensing: from literature review to a conceptual framework

R. I. Ogie
2016 Human-Centric Computing and Information Sciences  
The phenomenal growth in the richness and diversity of sensors on smart devices [3], combined with the inherent  ...  With rapid growth in mobile technologies, smart devices such as mobile phones, smart vehicles and wearables are fast becoming powerful sensing units used at a societal scale for monitoring the surrounding  ...  In a similar monetary incentive scheme based on reverse auction mechanism, users' privacy was guaranteed by enabling them to bid and claim their reward anonymously, while at the same time ensuring high  ... 
doi:10.1186/s13673-016-0080-3 fatcat:euypyllcvncvbpnnulyxghncfq

A Comprehensive Survey of Incentive Mechanism for Federated Learning [article]

Rongfei Zeng, Chao Zeng, Xingwei Wang, Bo Li, Xiaowen Chu
2021 arXiv   pre-print
Subsequently, we summarize the existing incentive mechanisms in terms of the main techniques, such as Stackelberg game, auction, contract theory, Shapley value, reinforcement learning, blockchain.  ...  Thus, it is quite crucial to inspire more participants to contribute their valuable resources with some payments for federated learning.  ...  With these bids, the remote server chooses K winners based on the computed score and determines their payments.  ... 
arXiv:2106.15406v1 fatcat:7v7adaw5wnbldhykma6mhgpnty

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
Wang, X., +, TPDS May 2014 1317-1327 Mechanical factors Free Market of Crowdsourcing: Incentive Mechanism Design for Mobile Sensing.  ...  ., +, TPDS Oct. 2014 2499-2508 Electronic mail Free Market of Crowdsourcing: Incentive Mechanism Design for Mobile Sensing.  ...  on Homogeneous Multiprocessors. 1510 -1521 In-Network Cache Management and Resource Allocation for Information-Centric Networks.  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

New Privacy-Preserving Ascending Auction for Assignment Problems

De Liu, Adib Bagh
2016 Social Science Research Network  
Despite these new features, (i) the auction stops in a finite time, (ii) sincere bidding is an ex-post Nash equilibrium, (iii) the auction ending prices and revenue depend only on bidders valuations and  ...  and compared across any number of mechanisms.  ...  Our work lays the foundation for analyzing bidder information revelation in a broad spectrum of dynamic and one-shot mechanisms.  ... 
doi:10.2139/ssrn.2883867 fatcat:lo3kgmom5vekja2alrhzf5gjyy

Credibility on Crowdsensing Data Acquisition

Manuel Neto, Danielo Gomes, José Soares
2019 Journal of Communication and Information Systems  
This paper focuses on the credibility of crowd sensed data. The ubiquity of crowdsensing platforms has enabled the capture of sensed information useful for several applications domains.  ...  However, one concern with crowdsensing is the information credibility and, over the last few years, we have seen a variety of approaches to leverage credibility on the crowdsensing platforms.  ...  [196] explored security and privacy issues on incentive mechanisms.  ... 
doi:10.14209/jcis.2019.26 fatcat:o4cja467jbgenap4akpxmcu3ym

Task Allocation Model Based on Worker Friend Relationship for Mobile Crowdsourcing

Bingxu Zhao, Yingjie Wang, Yingshu Li, Yang Gao, Xiangrong Tong
2019 Sensors  
The GeoHash coding mechanism is adopted in the process of calculating the strength of worker relationship, which effectively protects the location privacy of workers.  ...  With the rapid development of mobile devices, mobile crowdsourcing has become an important research focus. According to the task allocation, scholars have proposed many methods.  ...  [32] proposed an incentive mechanism based on multi-attribute reverse auction for mobile crowdsourcing. Li et al.  ... 
doi:10.3390/s19040921 fatcat:vsovr5bflrgafdemiimfjk6hja

Multimedia Edge Computing [article]

Zhi Wang, Wenwu Zhu, Lifeng Sun, Han Hu, Ge Ma, Ming Ma, Haitian Pang, Jiahui Ye, Hongshan Li
2021 arXiv   pre-print
In this paper, we investigate the recent studies on multimedia edge computing, from sensing not only traditional visual/audio data but also individuals' geographical preference and mobility behaviors,  ...  We provide both a retrospective view of recent rapid migration (resp. merge) of cloud multimedia to (resp. and) edge-aware multimedia and insights on the fundamental guidelines for designing multimedia  ...  high-quality, scalable, personalized, and privacy-protected multimedia services to edge-networked users a reality.  ... 
arXiv:2105.02409v1 fatcat:26eyjzgg2na2lep2crb4cfhs7m
« Previous Showing results 1 — 15 out of 160 results