Title: LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing
Authors: Wei Ren; Jiahua Lin; Qiang Cao; Yi Ren
Addresses: School of Computer Science, China University of Geosciences, Wuhan, 430074, China ' School of Computer Science, China University of Geosciences, Wuhan, 430074, China ' School of Computer Science, China University of Geosciences, Wuhan, 430074, China ' Department of Computer Science, National Chiao Tung University, Hsinchu, 30010, Taiwan
Abstract: Participatory sensing has been envisioned as a promising paradigm for rapidly sharing of environmental information by mobile smart phones that are always equipped with sensors. It invokes a large amount of mobile applications, e.g., participatory environmental monitoring, transportation and traffic management, and personal entertainments. As participators are usually volunteers, participatory sensing thus poses several fundamental security problems such as data trustworthiness, participator reputation evaluation, participator privacy protection and functional robustness against inner attacks or malicious participators. Although some schemes have already been proposed in recent years, none of them is able to solve the above problems in one solution, especially, in a lightweight manner. In this paper, we make the first attempt in this regard and propose a scheme called LibTip. We pinpoint and model several new attacks in participatory sensing that are launched from inner attackers such as bad-mouth attack and key leakage attack. The definitions for the security of the scheme are formally stated. The security and performance are thoroughly analysed or proved, which justifies the applicability of LibTip.
Keywords: privacy preservation; participatory sensing; lightweight; reputation evaluation; robustness; data trustworthiness; privacy protection; trust; smartphones; mobile apps; mobile applications; data security; inner attacks; bad-mouth attacks; key leakage attacks.
International Journal of Embedded Systems, 2016 Vol.8 No.2/3, pp.266 - 275
Available online: 26 Apr 2016Full-text access for editors Access for subscribers Purchase this article Comment on this article