SlideShare a Scribd company logo
1 of 12
USER PRIVACY AND DATA TRUSTWORTHINESS IN MOBILE
CROWD SENSING
Presented by
IIS TECHNOLOGIES
No: 40, C-Block,First Floor,HIET Campus,
North Parade Road,St.Thomas Mount,
Chennai, Tamil Nadu 600016.
Landline:044 4263 7391,mob:9952077540.
Email:info@iistechnologies.in,
Web:www.iistechnologies.in
www.iistechnologies.in
Ph: 9952077540
Abstract
• Mobile crowd sensing is an emerging technology based on the sensing and networking capabilities of such
mobile wearable devices.
• MCS has shown great potential in improving peoples’ quality of life, including healthcare and transportation,
and thus has found a wide range of novel applications.
• However, user privacy and data trustworthiness are two critical challenges faced by MCS.
• In this project, we introduce the architecture of MCS and discuss its unique characteristics and advantages
over traditional wireless sensor networks, which result in inapplicability of most existing WSN security
solutions.
www.iistechnologies.in
Ph: 9952077540
Existing System
• The security issue of MCS is the reliability of the uploaded data. As data are reported by
participants, they could possibly be falsified.
• Hence, this raises the issue of data trustworthiness Furthermore, this issue inherently conflicts
with the privacy issue.
• This is because if participants’ identities are not disclosed, those participants reporting falsified or
even fabricated data cannot be identified and eliminated.
• In other words, if full anonymity is provided to MCS participants, guaranteeing the
trustworthiness of reported data is difficult.
• Hence, data trustworthiness in MCS becomes more crucial than in traditional wireless sensor
networks (WSNs), which deploy a large number of wireless sensor devices managed by the
network owner.
www.iistechnologies.in
Ph: 9952077540
Disadvantages
www.iistechnologies.in
Ph: 9952077540
• Fabricated data cannot be identified and eliminated
• Data trustworthiness in MCS becomes more crucial
Proposed System
www.iistechnologies.in
Ph: 9952077540
• In MCS, privacy concerns arise due to the disclosure of private information such as participants’
identities, IP addresses, locations, trajectories, and lifestyle-related information.
• MCS applications even aggravate the privacy problem because they make large volumes of
information easily available through remote access. Thus, adversaries need not be physically
present to maintain surveillance.
• They can gather information in a low-risk and anonymous manner. Remote access also allows a
single adversary to monitor multiple users simultaneously. We consider users’ location
information as an example.
• Since MCS allows any voluntary participant to contribute data, the application server is exposed
to erroneous or even malicious data. For example, participants may inadvertently put their
wearable devices in an undesirable position while collecting sensor readings (e.g., Galaxy Gear
kept in a pocket while sampling street-level noise).
• Moreover, malicious participants may deliberately contribute bad data. Both behaviors result in
erroneous contributions, which need to be identified and eliminated to ensure the reliability of
the computed summaries.
Advantages
• Fabricated data can be finding
• Increase the packet delivery
www.iistechnologies.in
Ph: 9952077540
Architecture
www.iistechnologies.in
Ph: 9952077540
Conclusion
www.iistechnologies.in
Ph: 9952077540
• MCS is an innovative computing paradigm that bears great potential and can lead to a wide range
of novel applications relating to, for example, environmental monitoring, transportation, and
entertainment.
• In this project, we have presented the advantages of MCS over traditional WSNs.
• At the same time, we have also identified two important challenges of MCS, user privacy and data
trustworthiness.
• They are the two major barriers to the success and massive deployment of MCS systems. It is
important to overcome these challenges in order to move this field forward.
TOOLS AND SOFTWARE USED
Software
• Network simulator(NS2)
Language
• Object Oriented Tool Command Language(OTCL)
• C++
www.iistechnologies.in
Ph: 9952077540
References
• S. Gaonkar et al., “Micro-Blog: Sharing and Querying Content Through Mobile Phones and Social
Participation,” Proc. ACM MobiSys, 2008, pp. 174–86.
• P. Narula et al., “Security in Mobile Ad-Hoc Networks Using Soft Encryption and Trust-Based
Multi-Path Routing,” Comp. Commun., vol. 31, no. 4, Mar. 2008, pp. 760–69.
• I. Boutsis and V. Kalogeraki, “Privacy Preservation for Participatory Sensing Data,” Proc. IEEE
PerCom, Mar. 2013, pp. 103–13.
• K. L. Huang, S. S. Kanhere, and W. Hu, “Are You Contributing Trustworthy Data? The Case for a
Reputation System in Participatory Sensing,” Proc. ACM MSWiM, 2010, pp. 14–22.
• L. K. Huang, S. K. Salil, and H. Wen, “A Privacy-Preserving Reputation System for Participatory
Sensing,” Proc. IEEE LCN, 2012, pp. 10–18.
www.iistechnologies.in
Ph: 9952077540
Services Offered
• Coding with Software’s
• Documents
• Video File
• Skype classes(Online Support)
• Team viewer Support(Online Support)
• Future Enhancement
• Paper writing
• Support For Inter-National Conference paper publication.
www.iistechnologies.in
Ph: 9952077540
Contact
IIS TECHNOLOGIES
No: 40, C-Block,First Floor,HIET Campus,
North Parade Road,St.Thomas Mount,
Chennai, Tamil Nadu 600016.
Landline:044 4263 7391,mob:9952077540.
Email:info@iistechnologies.in,
Web:www.iistechnologies.in
www.iistechnologies.in

More Related Content

More from IISTech2015

A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...IISTech2015
 
Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...IISTech2015
 
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...IISTech2015
 
A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...IISTech2015
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksIISTech2015
 
Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...IISTech2015
 
Real time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation systemReal time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation systemIISTech2015
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...IISTech2015
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...IISTech2015
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksIISTech2015
 
2015-2016 IEEE Project Titles
2015-2016 IEEE Project Titles2015-2016 IEEE Project Titles
2015-2016 IEEE Project TitlesIISTech2015
 
Architecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controllerArchitecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controllerIISTech2015
 
The Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel ConverterThe Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel ConverterIISTech2015
 
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...IISTech2015
 
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...IISTech2015
 
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...IISTech2015
 
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...IISTech2015
 
Analysis and impacts of implementing
Analysis and impacts of implementing    Analysis and impacts of implementing
Analysis and impacts of implementing IISTech2015
 
A novel drive method for high speed brushless
A novel drive method for high speed brushless  A novel drive method for high speed brushless
A novel drive method for high speed brushless IISTech2015
 
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...IISTech2015
 

More from IISTech2015 (20)

A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...A virtual synchronous machine implementation for distributed control of power...
A virtual synchronous machine implementation for distributed control of power...
 
Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...Versatile control of unidirectional ac–dc boost converters for power quality ...
Versatile control of unidirectional ac–dc boost converters for power quality ...
 
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
Novel modular multiple input bidirectional dc–dc power converter (mipc) for h...
 
A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...A bidirectional llc resonant converter with automatic forward and backward mo...
A bidirectional llc resonant converter with automatic forward and backward mo...
 
Optimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networksOptimal configuration of network coding in ad hoc networks
Optimal configuration of network coding in ad hoc networks
 
Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...Vanet modeling and clustering design under practical traffic, channel and mob...
Vanet modeling and clustering design under practical traffic, channel and mob...
 
Real time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation systemReal time path planning based on hybrid vanet enhanced transportation system
Real time path planning based on hybrid vanet enhanced transportation system
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
An efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networksAn efficient distributed trust model for wireless sensor networks
An efficient distributed trust model for wireless sensor networks
 
2015-2016 IEEE Project Titles
2015-2016 IEEE Project Titles2015-2016 IEEE Project Titles
2015-2016 IEEE Project Titles
 
Architecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controllerArchitecture of fpga embedded multiprocessor programmable controller
Architecture of fpga embedded multiprocessor programmable controller
 
The Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel ConverterThe Delta Configured Modular Multilevel Converter
The Delta Configured Modular Multilevel Converter
 
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
Modular Cascaded H-Bridge Multilevel PV Inverter with Distributed MPPT for Gr...
 
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
Input-Series–Output-Parallel-Connected Buck Rectifiers for High-Voltage Appli...
 
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
Bridgeless PFC-Modified SEPIC Rectifier With Extended Gain for Universal Inpu...
 
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
Analysis of Dual-Carrier Modulator for Bidirectional Non inverting Buck–Boost...
 
Analysis and impacts of implementing
Analysis and impacts of implementing    Analysis and impacts of implementing
Analysis and impacts of implementing
 
A novel drive method for high speed brushless
A novel drive method for high speed brushless  A novel drive method for high speed brushless
A novel drive method for high speed brushless
 
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
A Multi-Input Bridgeless Resonant AC-DC Converter for Electromagnetic Energy ...
 

User privacy and data trustworthiness in mobile crowd sensing

  • 1. USER PRIVACY AND DATA TRUSTWORTHINESS IN MOBILE CROWD SENSING Presented by IIS TECHNOLOGIES No: 40, C-Block,First Floor,HIET Campus, North Parade Road,St.Thomas Mount, Chennai, Tamil Nadu 600016. Landline:044 4263 7391,mob:9952077540. Email:info@iistechnologies.in, Web:www.iistechnologies.in www.iistechnologies.in Ph: 9952077540
  • 2. Abstract • Mobile crowd sensing is an emerging technology based on the sensing and networking capabilities of such mobile wearable devices. • MCS has shown great potential in improving peoples’ quality of life, including healthcare and transportation, and thus has found a wide range of novel applications. • However, user privacy and data trustworthiness are two critical challenges faced by MCS. • In this project, we introduce the architecture of MCS and discuss its unique characteristics and advantages over traditional wireless sensor networks, which result in inapplicability of most existing WSN security solutions. www.iistechnologies.in Ph: 9952077540
  • 3. Existing System • The security issue of MCS is the reliability of the uploaded data. As data are reported by participants, they could possibly be falsified. • Hence, this raises the issue of data trustworthiness Furthermore, this issue inherently conflicts with the privacy issue. • This is because if participants’ identities are not disclosed, those participants reporting falsified or even fabricated data cannot be identified and eliminated. • In other words, if full anonymity is provided to MCS participants, guaranteeing the trustworthiness of reported data is difficult. • Hence, data trustworthiness in MCS becomes more crucial than in traditional wireless sensor networks (WSNs), which deploy a large number of wireless sensor devices managed by the network owner. www.iistechnologies.in Ph: 9952077540
  • 4. Disadvantages www.iistechnologies.in Ph: 9952077540 • Fabricated data cannot be identified and eliminated • Data trustworthiness in MCS becomes more crucial
  • 5. Proposed System www.iistechnologies.in Ph: 9952077540 • In MCS, privacy concerns arise due to the disclosure of private information such as participants’ identities, IP addresses, locations, trajectories, and lifestyle-related information. • MCS applications even aggravate the privacy problem because they make large volumes of information easily available through remote access. Thus, adversaries need not be physically present to maintain surveillance. • They can gather information in a low-risk and anonymous manner. Remote access also allows a single adversary to monitor multiple users simultaneously. We consider users’ location information as an example. • Since MCS allows any voluntary participant to contribute data, the application server is exposed to erroneous or even malicious data. For example, participants may inadvertently put their wearable devices in an undesirable position while collecting sensor readings (e.g., Galaxy Gear kept in a pocket while sampling street-level noise). • Moreover, malicious participants may deliberately contribute bad data. Both behaviors result in erroneous contributions, which need to be identified and eliminated to ensure the reliability of the computed summaries.
  • 6. Advantages • Fabricated data can be finding • Increase the packet delivery www.iistechnologies.in Ph: 9952077540
  • 8. Conclusion www.iistechnologies.in Ph: 9952077540 • MCS is an innovative computing paradigm that bears great potential and can lead to a wide range of novel applications relating to, for example, environmental monitoring, transportation, and entertainment. • In this project, we have presented the advantages of MCS over traditional WSNs. • At the same time, we have also identified two important challenges of MCS, user privacy and data trustworthiness. • They are the two major barriers to the success and massive deployment of MCS systems. It is important to overcome these challenges in order to move this field forward.
  • 9. TOOLS AND SOFTWARE USED Software • Network simulator(NS2) Language • Object Oriented Tool Command Language(OTCL) • C++ www.iistechnologies.in Ph: 9952077540
  • 10. References • S. Gaonkar et al., “Micro-Blog: Sharing and Querying Content Through Mobile Phones and Social Participation,” Proc. ACM MobiSys, 2008, pp. 174–86. • P. Narula et al., “Security in Mobile Ad-Hoc Networks Using Soft Encryption and Trust-Based Multi-Path Routing,” Comp. Commun., vol. 31, no. 4, Mar. 2008, pp. 760–69. • I. Boutsis and V. Kalogeraki, “Privacy Preservation for Participatory Sensing Data,” Proc. IEEE PerCom, Mar. 2013, pp. 103–13. • K. L. Huang, S. S. Kanhere, and W. Hu, “Are You Contributing Trustworthy Data? The Case for a Reputation System in Participatory Sensing,” Proc. ACM MSWiM, 2010, pp. 14–22. • L. K. Huang, S. K. Salil, and H. Wen, “A Privacy-Preserving Reputation System for Participatory Sensing,” Proc. IEEE LCN, 2012, pp. 10–18. www.iistechnologies.in Ph: 9952077540
  • 11. Services Offered • Coding with Software’s • Documents • Video File • Skype classes(Online Support) • Team viewer Support(Online Support) • Future Enhancement • Paper writing • Support For Inter-National Conference paper publication. www.iistechnologies.in Ph: 9952077540
  • 12. Contact IIS TECHNOLOGIES No: 40, C-Block,First Floor,HIET Campus, North Parade Road,St.Thomas Mount, Chennai, Tamil Nadu 600016. Landline:044 4263 7391,mob:9952077540. Email:info@iistechnologies.in, Web:www.iistechnologies.in www.iistechnologies.in