{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:04:58Z","timestamp":1755993898204,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T00:00:00Z","timestamp":1731974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"Swedish Research Council (VR)","award":["2020-04621"],"award-info":[{"award-number":["2020-04621"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,19]]},"DOI":"10.1145\/3690134.3694826","type":"proceedings-article","created":{"date-parts":[[2024,11,22]],"date-time":"2024-11-22T06:22:58Z","timestamp":1732256578000},"page":"118-124","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Mobile Crowdsensing Sybil Attackers via Presence Verification"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4761-7676","authenticated-orcid":false,"given":"Cihan","family":"Eryonucu","sequence":"first","affiliation":[{"name":"Networked Systems Security Group, KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3267-5374","authenticated-orcid":false,"given":"Panos","family":"Papadimitratos","sequence":"additional","affiliation":[{"name":"Networked Systems Security Group, KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Hardened Registration Process for Participatory Sensing. In 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec). 281--282","author":"Borsub Jatesada","year":"2018","unstructured":"Jatesada Borsub and Panos Papadimitratos. 2018. Hardened Registration Process for Participatory Sensing. In 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec). 281--282."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212480.3226109"},{"volume-title":"Infrastructures and Mobile Applications: 13th IMCL Conference.","author":"Chatzimichail A.","key":"e_1_3_2_1_3_1","unstructured":"A. Chatzimichail, A. Tsanousa, G. Meditskos, S. Vrochidis, and I. Kompatsiaris. 2021. RSSI fingerprinting techniques for indoor localization datasets. In Internet of Things, Infrastructures and Mobile Applications: 13th IMCL Conference."},{"volume-title":"2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'06)","author":"Demirbas M.","key":"e_1_3_2_1_4_1","unstructured":"M. Demirbas and Y. Song. 2006. An RSSI-based scheme for sybil attack detection in wireless sensor networks. In 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'06)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"volume-title":"15th ACM Conference on Security and Privacy in Wireless and Mobile Networks","author":"Eryonucu C.","key":"e_1_3_2_1_6_1","unstructured":"C. Eryonucu and P. Papadimitratos. 2022. Sybil-Based Attacks on Google Maps or How to Forge the Image of City Life. In 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks (San Antonio, TX, USA). 12 pages."},{"volume-title":"Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy. In European Symposium on Research in Computer Security (ESORICS).","author":"Eryonucu C.","key":"e_1_3_2_1_7_1","unstructured":"C. Eryonucu and P. Papadimitratos. 2023. Security and Privacy for Mobile Crowdsensing: Improving User Relevance and Privacy. In European Symposium on Research in Computer Security (ESORICS)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627402"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"S. Gisdakis T. Giannetsos and P. Papadimitratos. 2016. Security Privacy and Incentive Provision for Mobile Crowd Sensing Systems. IEEE Internet of Things Journal (Oct. 2016).","DOI":"10.1109\/JIOT.2016.2560768"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"M. Jamshidi E. Zangeneh M. Esnaashari and M. R. Meybodi. 2017. A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks. Computers & Electrical Engineering (Nov. 2017).","DOI":"10.1016\/j.compeleceng.2016.12.011"},{"key":"e_1_3_2_1_11_1","unstructured":"Ronghua Li. 2022. Advanced Hardened Registration Process for Mobile Crowd Sensing. https:\/\/www.diva-portal.org\/smash\/get\/diva2:1668730\/FULLTEXT01.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2908638"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"M. Nikodem and M. Bawiec. 2019. Experimental evaluation of advertisement-based bluetooth low energy communication. Sensors MDPI (2019).","DOI":"10.3390\/s20010107"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"P. Sarigiannidis E. Karapistoli and A. A. Economides. 2015. Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information. Expert Systems with Applications (Nov. 2015).","DOI":"10.1016\/j.eswa.2015.05.057"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"M. Shin C. Cornelius D. Peebles A. Kapadia D. Kotz and N. Triandopoulos. 2011. AnonySense: A system for anonymous opportunistic sensing. Pervasive and Mobile Computing (2011).","DOI":"10.1016\/j.pmcj.2010.04.001"},{"key":"e_1_3_2_1_16_1","unstructured":"Bluetooth SIG. 2024. Range. https:\/\/www.bluetooth.com\/learn-about-bluetooth\/key-attributes\/range\/. Accessed: 2024-06--22."},{"volume-title":"Robust Sybil Detection for MANETs. In International Conference on Computer Communications and Networks. IEEE.","author":"Tangpong A.","key":"e_1_3_2_1_17_1","unstructured":"A. Tangpong, G. Kesidis, H. Hsu, and A. Hurson. 2009. Robust Sybil Detection for MANETs. In International Conference on Computer Communications and Networks. IEEE."},{"volume-title":"Hunting Sybils in Participatory Mobile Consensus-Based Networks. In ACM Asia Conference on Computer and Communications Security (AsiaCCS).","author":"Verchok N.","key":"e_1_3_2_1_18_1","unstructured":"N. Verchok and A. Orailouglu. 2020. Hunting Sybils in Participatory Mobile Consensus-Based Networks. In ACM Asia Conference on Computer and Communications Security (AsiaCCS)."},{"key":"e_1_3_2_1_19_1","unstructured":"I. ?uran. [n.d.]. Fake road closure - Google Maps Community. https:\/\/support.google.com\/maps\/thread\/137301768\/fake-road-closure?hl=en [Online; accessed 11-February-202]."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the Sixth Workshop on CPS&amp;IoT Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690134.3694826","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690134.3694826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:29:13Z","timestamp":1755916153000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690134.3694826"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,19]]},"references-count":19,"alternative-id":["10.1145\/3690134.3694826","10.1145\/3690134"],"URL":"https:\/\/doi.org\/10.1145\/3690134.3694826","relation":{},"subject":[],"published":{"date-parts":[[2024,11,19]]},"assertion":[{"value":"2024-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}