{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T13:51:44Z","timestamp":1719409904926},"reference-count":38,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>People-centric sensing with smart phones can be used for large scale sensing of the physical world at low cost by leveraging the available sensors on the phones. However, the sensed data submitted by participants is not always reliable as they can submit false data to earn money without executing the actual task at the desired location. To address this problem, the authors propose ILR, a scheme which Improves the Location Reliability of mobile crowd sensed data with minimal human efforts. In this scheme, the authors bootstrap the trust in the system by first manually validating a small number of photos submitted by participants. Based on these validations, the location of these photos is assumed to be trusted. Second, the authors extend this location trust to co-located sensed data points found in the Bluetooth range of the devices that provided the validated photos. In addition, the scheme also helps to detect false location claims associated with sensed data. The authors applied ILR on data collected from their McSense prototype deployed on Android phones used by students on their campus and detected a significant percentage of the malicious users.<\/p>","DOI":"10.4018\/ijbdcn.2013100104","type":"journal-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T18:22:37Z","timestamp":1393352557000},"page":"65-85","source":"Crossref","is-referenced-by-count":6,"title":["ILR"],"prefix":"10.4018","volume":"9","author":[{"given":"Manoop","family":"Talasila","sequence":"first","affiliation":[{"name":"Department of Computer Science, New Jersey Institute of Technology, Newark, NJ, USA"}]},{"given":"Reza","family":"Curtmola","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New Jersey Institute of Technology, Newark, NJ, USA"}]},{"given":"Cristian","family":"Borcea","sequence":"additional","affiliation":[{"name":"Department of Computer Science, New Jersey Institute of Technology, Newark, NJ, USA"}]}],"member":"2432","reference":[{"key":"ijbdcn.2013100104-0","unstructured":"Amazon Mechanical Turk. (2013). Retrieved from http:\/\/www.mturk.com"},{"key":"ijbdcn.2013100104-1","unstructured":"Burke, J., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., & Srivastava, M. B. (2006). Participatory sensing. In Proceedings of the Workshop on World- Sensor-Web (WSW\u201906): Mobile Device Centric Sensor Networks and Applications (pp. 117\u2013134)."},{"key":"ijbdcn.2013100104-2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2008.90"},{"key":"ijbdcn.2013100104-3","doi-asserted-by":"crossref","unstructured":"Capkun, S., Cagalj, M., & Srivastava, M. (2006). Secure localization with hidden and mobile base stations. In Proceedings of IEEE INFOCOM. Citeseer.","DOI":"10.1109\/INFOCOM.2006.302"},{"key":"ijbdcn.2013100104-4","doi-asserted-by":"crossref","unstructured":"Capkun, S., & Hubaux, J. (2005). Secure positioning of wireless devices with application to sensor networks. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM\u201905) (pp. 1917\u20131928).","DOI":"10.1109\/INFCOM.2005.1498470"},{"key":"ijbdcn.2013100104-5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6525603"},{"key":"ijbdcn.2013100104-6","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9259-5"},{"key":"ijbdcn.2013100104-7","doi-asserted-by":"crossref","unstructured":"Downs, J., Holbrook, M., Sheng, S., & Cranor, L. (2010). Are your participants gaming the system?: Screening Mechanical Turk workers. In Proceedings of the 28th International Conference on Human Factors in Computing Systems (CHI\u201910) (pp. 2399\u20132402). ACM.","DOI":"10.1145\/1753326.1753688"},{"key":"ijbdcn.2013100104-8","unstructured":"Dua, A., Bulusu, N., Feng, W., & Hu, W. (2009). Towards trustworthy participatory sensing. In Proceedings of the Usenix Workshop on Hot Topics in Security (HotSec\u201909)."},{"key":"ijbdcn.2013100104-9","doi-asserted-by":"crossref","unstructured":"Gilbert, P., Cox, L., Jung, J., & Wetherall, D. (2010). Toward trustworthy mobile sensing. In Proceedings of the 11th Workshop on Mobile Computing Systems & Applications (HotMobile\u201910) (pp. 31\u201336). ACM.","DOI":"10.1145\/1734583.1734592"},{"key":"ijbdcn.2013100104-10","doi-asserted-by":"crossref","unstructured":"Gilbert, P., Jung, J., Lee, K., Qin, H., Sharkey, D., Sheth, A., & Cox, L. (2011). Youprove: Authenticity and fidelity in mobile sensing. In Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems (SenSys\u201911) (pp. 176\u2013189).","DOI":"10.1145\/2070942.2070961"},{"key":"ijbdcn.2013100104-11","unstructured":"Google play. (2013). Android app store. Retrieved from https:\/\/play.google.com\/"},{"key":"ijbdcn.2013100104-12","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2009.10.006"},{"key":"ijbdcn.2013100104-13","unstructured":"Humphreys, T., Ledvina, B., & Psiaki, M. OHanlon, B., & Kintner Jr, P. (2008). Assessing the spoofing threat: Development of a portable gps civilian spoofer. In Proceedings of the ION GNSS International Technical Meeting of the Satellite Division."},{"key":"ijbdcn.2013100104-14","unstructured":"Intel labs. (2013). The mobile phone that breathes. Retrieved from http:\/\/scitech.blogs.cnn.com\/2010\/04\/22\/the-mobilephone-that-breathes\/"},{"key":"ijbdcn.2013100104-15","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2010.08.006"},{"key":"ijbdcn.2013100104-16","doi-asserted-by":"crossref","unstructured":"Mardenfeld, S., Boston, D., Pan, S. J., Jones, Q., Iamntichi, A., & Borcea, C. (2010). GDC: Group discovery using co-location traces. In Proceedings of Second International Conference on Social Computing (SocialCom) (pp. 641\u2013648). IEEE.","DOI":"10.1109\/SocialCom.2010.99"},{"key":"ijbdcn.2013100104-17","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352625"},{"key":"ijbdcn.2013100104-18","unstructured":"McSense. (2013). Android smartphone application. Retrieved from https:\/\/play.google.com\/store\/apps\/details?id=com.mcsense.app"},{"key":"ijbdcn.2013100104-19","unstructured":"McSense project. (2013). Retrieved from http:\/\/web.njit.edu\/~mt57\/mcsense\/"},{"key":"ijbdcn.2013100104-20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13869-0_1"},{"key":"ijbdcn.2013100104-21","unstructured":"Photo journalism. (2013). Retrieved from http:\/\/www.flickr.com\/groups\/photojournalism"},{"key":"ijbdcn.2013100104-22","doi-asserted-by":"crossref","unstructured":"Ra, M., Liu, B., La Porta, T., & Govindan, R. (2012). Medusa: A programming framework for crowd-sensing applications. In Proceedings of the 10th international conference on Mobile systems, applications, and services (MobiSys\u201912) (pp. 337\u2013350). ACM.","DOI":"10.1145\/2307636.2307668"},{"key":"ijbdcn.2013100104-23","doi-asserted-by":"crossref","unstructured":"Ravi, N., Shankar, P., Frankel, A., Elgammal, A., & Iftode, L. (2006). Indoor localization using camera phones. In Proceedings of the 7th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA\u201906) (pp. 19\u201325).","DOI":"10.1109\/WMCSA.2006.4625206"},{"key":"ijbdcn.2013100104-24","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2007.46"},{"key":"ijbdcn.2013100104-25","doi-asserted-by":"crossref","unstructured":"Saroiu, S., & Wolman, A. (2010). I am a sensor, and I approve this message. In Proceedings of the 11th Workshop on Mobile Computing Systems & Applications (HotMobile\u201910) (pp. 37\u201342). ACM.","DOI":"10.1145\/1734583.1734593"},{"key":"ijbdcn.2013100104-26","doi-asserted-by":"crossref","unstructured":"Sastry, N., Shankar, U., & Wagner, D. (2003). Secure verification of location claims. In Proceedings of the 2nd ACM workshop on Wireless security (WiSe\u201903) (pp. 1\u201310). ACM.","DOI":"10.1145\/941311.941313"},{"key":"ijbdcn.2013100104-27","doi-asserted-by":"crossref","unstructured":"Schneider, F. B., Walsh, K., & Sirer, E. G. (2011). Nexus authorization logic (nal): Design rationale and applications. ACM Trans. Inf. Syst. Secur., Jun. 2011, 14(1), 8:1\u20138:28.","DOI":"10.1145\/1952982.1952990"},{"key":"ijbdcn.2013100104-28","unstructured":"Sensordrone. (2013). The 6th sense of your smartphone. Retrieved from http:\/\/www.sensorcon.com\/sensordrone"},{"key":"ijbdcn.2013100104-29","unstructured":"Sensorlab at Dartmouth. (2013). Smart phone sensing research. Retrieved from http:\/\/sensorlab.cs.dartmouth.edu\/research.html"},{"key":"ijbdcn.2013100104-30","doi-asserted-by":"crossref","unstructured":"Talasila, M., Curtmola, R., & Borcea, C. (2010). Link: Location verification through immediate neighbors knowledge. In Proceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems, (MobiQuitous\u201910) (pp. 210\u2013223). Springer.","DOI":"10.1007\/978-3-642-29154-8_18"},{"key":"ijbdcn.2013100104-31","doi-asserted-by":"crossref","unstructured":"Talasila, M., Curtmola, R., & Borcea, C. (2013). Improving location reliability in crowd sensed data with minimal efforts. In Proceedings of the 6th Joint IFIP\/IEEE Wireless and Mobile Networking Conference (WMNC'13).","DOI":"10.1109\/WMNC.2013.6549016"},{"key":"ijbdcn.2013100104-32","doi-asserted-by":"crossref","unstructured":"Toyama, K., Logan, R., & Roseway, A. (2003). Geographic location tags on digital images. In Proceedings of the 11th ACM international conference on Multimedia (pp. 156\u2013166).","DOI":"10.1145\/957013.957046"},{"key":"ijbdcn.2013100104-33","unstructured":"Trusted platform module. (2013). Retrieved from http:\/\/www.trustedcomputinggroup.org\/developers\/trusted platform module"},{"key":"ijbdcn.2013100104-34","unstructured":"Urban Sensing at UCLA. (2013). University of California Los Angeles Urban Sensing Research. Retrieved from http:\/\/research.cens.ucla.edu\/urbansensing\/"},{"key":"ijbdcn.2013100104-35","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-011-0304-8"},{"issue":"3","key":"ijbdcn.2013100104-36","first-page":"321","article-title":"A policy enforcing mechanism for trusted ad hoc networks. Dependable and Secure Computing","volume":"8","author":"G.Xu","year":"2011","journal-title":"IEEE Transactions"},{"key":"ijbdcn.2013100104-37","doi-asserted-by":"crossref","unstructured":"Yan, T., Marzilli, M., Holmes, R., Ganesan, D., & Corner, M. (2009). mCrowd: A platform for mobile crowdsourcing. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys\u201909) (pp. 347\u2013348). ACM.","DOI":"10.1145\/1644038.1644094"}],"container-title":["International Journal of Business Data Communications and Networking"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=101905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T21:33:30Z","timestamp":1654119210000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijbdcn.2013100104"}},"subtitle":["Improving Location Reliability in Mobile Crowd Sensing"],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijbdcn.2013100104","relation":{},"ISSN":["1548-0631","1548-064X"],"issn-type":[{"value":"1548-0631","type":"print"},{"value":"1548-064X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}