Int. J. of Embedded Systems   »   2016 Vol.8, No.2/3

 

 

Title: LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing

 

Authors: Wei Ren; Jiahua Lin; Qiang Cao; Yi Ren

 

Addresses:
School of Computer Science, China University of Geosciences, Wuhan, 430074, China
School of Computer Science, China University of Geosciences, Wuhan, 430074, China
School of Computer Science, China University of Geosciences, Wuhan, 430074, China
Department of Computer Science, National Chiao Tung University, Hsinchu, 30010, Taiwan

 

Abstract: Participatory sensing has been envisioned as a promising paradigm for rapidly sharing of environmental information by mobile smart phones that are always equipped with sensors. It invokes a large amount of mobile applications, e.g., participatory environmental monitoring, transportation and traffic management, and personal entertainments. As participators are usually volunteers, participatory sensing thus poses several fundamental security problems such as data trustworthiness, participator reputation evaluation, participator privacy protection and functional robustness against inner attacks or malicious participators. Although some schemes have already been proposed in recent years, none of them is able to solve the above problems in one solution, especially, in a lightweight manner. In this paper, we make the first attempt in this regard and propose a scheme called LibTip. We pinpoint and model several new attacks in participatory sensing that are launched from inner attackers such as bad-mouth attack and key leakage attack. The definitions for the security of the scheme are formally stated. The security and performance are thoroughly analysed or proved, which justifies the applicability of LibTip.

 

Keywords: privacy preservation; participatory sensing; lightweight; reputation evaluation; robustness; data trustworthiness; privacy protection; trust; smartphones; mobile apps; mobile applications; data security; inner attacks; bad-mouth attacks; key leakage attacks.

 

DOI: 10.1504/IJES.2016.076120

 

Int. J. of Embedded Systems, 2016 Vol.8, No.2/3, pp.266 - 275

 

Available online: 26 Apr 2016

 

 

Editors Full text accessPurchase this articleComment on this article