Filters








6,041 Hits in 11.6 sec

Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications

Kenneth Li Minn Ang, Jasmine Kah Phooi Seng, Ericmoore Ngharamike
2022 Future Internet  
Crowdsourcing can play an important role in the Internet of Things (IoT) applications for information sensing and gathering where the participants are equipped with geolocated devices.  ...  This paper presents a comprehensive survey for this new Crowdsourcing IoT paradigm from four different perspectives: (1) Architectures for Crowd-IoT; (2) Trustworthy, Privacy and Security for Crowd-IoT  ...  Sensing tasks are distributed across anonymous participating mobile devices, verified, anonymized, in this participatory sensing mode. Das et al.  ... 
doi:10.3390/fi14020049 fatcat:o62tjaayyvfnjc75irzkpzu5vy

Incentive Mechanisms for Mobile Crowd Sensing: Current States and Challenges of Work [article]

Jiajun Sun
2014 arXiv   pre-print
Mobile crowd sensing (MCS) is a new paradigm which leverages the ubiquity of sensor-equipped mobile devices such as smartphones, music players, and in-vehicle sensors at the edge of the Internet, to collect  ...  The new paradigm will fuel the evolution of the Internet of Things to three changes as follows: First, the terminal devices at the edge of the Internet change from PCs to mobile phones.  ...  For example, some researchers propose that raw sensing data should not be pushed to the cloud since the cloud may release users' identity privacy and social profile privacy. all these challenges will provide  ... 
arXiv:1310.8364v2 fatcat:idpwttacungprh2eqnhc3i2nry

Edge-centric Computing

Pedro Garcia Lopez, Alberto Montresor, Dick Epema, Anwitaman Datta, Teruo Higashino, Adriana Iamnitchi, Marinho Barcellos, Pascal Felber, Etienne Riviere
2015 Computer communication review  
in data centers and clouds.  ...  , privacy, and autonomy requires taking the control of computing applications, data, and services away from some central nodes (the "core") to the other logical extreme (the "edge") of the Internet.  ...  Social Networks may evolve to provide human participation in heterogeneous groups.  ... 
doi:10.1145/2831347.2831354 fatcat:bhb7y5rxoncela36rvrv54xgdq

Simulation Of Trust-Based Mechanism For Enhancing User Confidence In Mobile Crowdsensing Systems

Dorothy Mwongeli Kalui, Dezheng Zhang, Geoffrey Muchiri Muketha, Jared Onsomu
2020 IEEE Access  
The level of MCS security is enhanced to protect the privacy of participants, so that participants can be assured that the MCS system they are working with during sensing moment is trustworthy.  ...  In MCS systems, trust is a key focus in the overall improvement in the participant uptake of the sensing tasks.  ...  [32] , ensuring privacy-preserving in MCS system encourages mobile users to use MCS system applications and participate in sensing and data collection.  ... 
doi:10.1109/access.2020.2968797 fatcat:kegfiusr2bcudifqh2vze4bbd4

Guest Editorial Introduction to the Special Section on Artificial Intelligence For Social Networks

Yingshu Li, Mihaela Cardei, Chaokun Wang, Chaokun Wang
2021 IEEE Transactions on Network Science and Engineering  
In "Privacy-Preserving Participant Grouping for Mobile Social Sensing over Edge Clouds", Li et al. investigate a new set of privacy-preserving grouping problems over edge clouds with the intention of minimizing  ...  Two scenarios, tree-based hierarchical edge clouds and graph-based interconnected edge clouds, are considered and different grouping schemes are designed to satisfy the different optimization goals.  ... 
doi:10.1109/tnse.2021.3073631 fatcat:ra5pcp7pa5czveiggfhxulxtdi

Privacy-Preserving Internet of Things: Techniques and Applications

2019 International Journal of Engineering and Advanced Technology  
Hence, it is necessary to preserve the privacy of data collected by IoT devices.  ...  Finally, a comparative analysis of privacy preserving techniques with its applications are presented.  ...  The privacy of the collected data is preserved through obfuscation of data with other participants data in the group and thus it hides the individual privacy.  ... 
doi:10.35940/ijeat.f8830.088619 fatcat:onkuoapbkzhdtggza6ib7jj5ka

Federated Learning for Internet of Things: A Comprehensive Survey [article]

Dinh C. Nguyen, Ming Ding, Pubudu N. Pathirana, Aruna Seneviratne, Jun Li, H. Vincent Poor
2021 arXiv   pre-print
, and IoT privacy and security.  ...  Particularly, we explore and analyze the potential of FL for enabling a wide range of IoT services, including IoT data sharing, data offloading and caching, attack detection, localization, mobile crowdsensing  ...  [99] Mobile sensing DFL - IoT devices Cloud servers A distributed FL solution for mobile sensing in IoT. The given model is simple and hard to apply for other scenarios.  ... 
arXiv:2104.07914v1 fatcat:b5wsrfcbynel7jqdxpfw4ftwh4

Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems

Yuan Hong, Valerie Issarny, Surya Nepal, Mudhakar Srivatsa
2021 IEEE Transactions on Emerging Topics in Computing  
The Internet coupled with recent advances in computing and information technologies, such as IoT, mobile edge/cloud computing, cyber-physical-social systems, and artificial intelligence/machine learning  ...  , machine learning robustness, authorizations, mobile computing, and deep learning for blockchain applications.  ...  The Internet coupled with recent advances in computing and information technologies, such as IoT, mobile edge/cloud computing, cyber-physical-social systems, and artificial intelligence/machine learning  ... 
doi:10.1109/tetc.2021.3076338 fatcat:zajlttxulzbi3n7gzkkpra5z6e

Learner's Dilemma: IoT Devices Training Strategies in Collaborative Deep Learning [article]

Deepti Gupta, Olumide Kayode, Smriti Bhatt, Maanak Gupta, Ali Saman Tosun
2020 arXiv   pre-print
Due to privacy requirements, smart IoT devices do not release data to a remote third party for their use.  ...  We further present a novel cluster-based fair strategy to approximately solve the CDL game to enforce mobile edge devices for cooperation.  ...  [14] adopt a two-server model for privacy-preserving training, used by previous work on privacy-preserving deep learning via SMC [15] . However, Aono et al.  ... 
arXiv:2007.15215v1 fatcat:ytva6sngdffb5jwtflrojdx6ra

A Survey on Social-Physical Sensing [article]

Md Tahmid Rashid, Na Wei, Dong Wang
2021 arXiv   pre-print
Meanwhile, social sensing is contriving as a pervasive sensing paradigm that leverages the observations from human participants equipped with portable devices and ubiquitous Internet connectivity (i.e.  ...  Motivated by the complementary virtues of both physical and social sensing, social-physical sensing (SPS) is protruding as an emerging sensing paradigm that tightly integrates social and physical sensors  ...  In recent times, a subset of edge computing known as multiaccess edge computing or mobile edge computing (MEC) has received substantial attention which extends the capabilities of cloud computing by abstracting  ... 
arXiv:2104.01360v1 fatcat:b6sag5objzhezcfhscb3ctf2ca

A Survey on Secure Data Analytics in Edge Computing

Dan Liu, Zheng Yan, Wenxiu Ding, Mohammed Atiquzzaman
2019 IEEE Internet of Things Journal  
Unfortunately, edge computing brings new security and privacy challenges when applied to data analytics.  ...  In this paper, we first introduce the concept and features of edge computing, and then propose a number of requirements for its secure data analytics by analyzing potential security threats in edge computing  ...  [69] proposed two privacy-preserving reputation management mechanisms for edge computing-based mobile crowdsensing to deal with malicious participants.  ... 
doi:10.1109/jiot.2019.2897619 fatcat:fqmkiuse4vgafhiexe4ymqtx6m

Table of contents

2020 IEEE Internet of Things Journal  
Wei 5345 Privacy-Preserving Packet Header Checking Over in-the-Cloud Middleboxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Yang 5291 A Learning-Based Credible Participant Recruitment Strategy for Mobile Crowd Sensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jiot.2020.2999836 fatcat:5srjm7fs75brfooezedgjbs6qe

Victim detection platform in IoT paradigm

Rajendra Akerkar Minsung Hong
2019 Zenodo  
First, we have reviewed related literature regarding three crucial issues (ie, multi-modal evaluation for reliable data, edge-based real-time response, and privacy-preserved Big Data analysis) to satisfy  ...  In this paper, we propose a Victim Detection Platform (VDP) architecture combining both approaches using various advanced technologies such as IoT, drone and edge/cloud computing to offer higher quality  ...  In this regard, these two concepts are used for multi-modal data evaluation and privacy-preserved data-driven analysis. • Edge and Cloud Computing: They work as physical and cyber infrastructures of VDP  ... 
doi:10.5281/zenodo.5106037 fatcat:nw36orulgjh6rllzgqcd67abdu

A Review of Mobile Crowdsourcing Architectures and Challenges: Toward Crowd-Empowered Internet-of-Things

Jurairat Phuttharak, Seng W. Loke
2019 IEEE Access  
The problems that can be tackled include the use of geographically distributed tasks, and mobile sensing using the collective wisdom of the crowd.  ...  , architectures, and key considerations for their development.  ...  Anonymity, as an effective solution for privacy preservation, has also been adopted to preserve mobile users' privacy in mobile crowdsensing [2] . Cornelius et al.  ... 
doi:10.1109/access.2018.2885353 fatcat:vtfbb7ydjre2rfkulrjm6ypyma

Federated Learning for Internet of Things: A Comprehensive Survey

Dinh C. Nguyen, Ming Ding, Pubudu N. Pathirana, Aruna Seneviratne, Jun Li, H. Vincent Poor
2021 IEEE Communications Surveys and Tutorials  
, and IoT privacy and security.  ...  Particularly, we explore and analyze the potential of FL for enabling a wide range of IoT services, including IoT data sharing, data offloading and caching, attack detection, localization, mobile crowdsensing  ...  participants and a cloud server as the aggregator.  ... 
doi:10.1109/comst.2021.3075439 fatcat:ycq2zydqrzhibfqyo4vzloeoqy
« Previous Showing results 1 — 15 out of 6,041 results