1,387 research outputs found
Unifying Threats Against Information Integrity In Participatory Crowd Sensing
This article proposes a unified threat landscape for participatory crowd sensing (P-CS) systems. Specifically, it focuses on attacks from organized malicious actors that may use the knowledge of P-CS platform\u27s operations and exploit algorithmic weaknesses in AI-based methods of event trust, user reputation, decision-making, or recommendation models deployed to preserve information integrity in P-CS. We emphasize on intent driven malicious behaviors by advanced adversaries and how attacks are crafted to achieve those attack impacts. Three directions of the threat model are introduced, such as attack goals, types, and strategies. We expand on how various strategies are linked with different attack types and goals, underscoring formal definition, their relevance, and impact on the P-CS platform
Reliable Federated Learning for Mobile Networks
Federated learning, as a promising machine learning approach, has emerged to
leverage a distributed personalized dataset from a number of nodes, e.g.,
mobile devices, to improve performance while simultaneously providing privacy
preservation for mobile users. In the federated learning, training data is
widely distributed and maintained on the mobile devices as workers. A central
aggregator updates a global model by collecting local updates from mobile
devices using their local training data to train the global model in each
iteration. However, unreliable data may be uploaded by the mobile devices
(i.e., workers), leading to frauds in tasks of federated learning. The workers
may perform unreliable updates intentionally, e.g., the data poisoning attack,
or unintentionally, e.g., low-quality data caused by energy constraints or
high-speed mobility. Therefore, finding out trusted and reliable workers in
federated learning tasks becomes critical. In this article, the concept of
reputation is introduced as a metric. Based on this metric, a reliable worker
selection scheme is proposed for federated learning tasks. Consortium
blockchain is leveraged as a decentralized approach for achieving efficient
reputation management of the workers without repudiation and tampering. By
numerical analysis, the proposed approach is demonstrated to improve the
reliability of federated learning tasks in mobile networks
Reputation and Reward : Two Sides of the Same Bitcoin
In Mobile Crowd Sensing (MCS), the power of the crowd, jointly with the sensing capabilities of the smartphones they wear, provides a new paradigm for data sensing. Scenarios involving user behavior or those that rely on user mobility are examples where standard sensor networks may not be suitable, and MCS provides an interesting solution. However, including human participation in sensing tasks presents numerous and unique research challenges. In this paper, we analyze three of the most important: user participation, data sensing quality and user anonymity. We tackle the three as a whole, since all of them are strongly correlated. As a result, we present PaySense, a general framework that incentivizes user participation and provides a mechanism to validate the quality of collected data based on the users' reputation. All such features are performed in a privacy-preserving way by using the Bitcoin cryptocurrency. Rather than a theoretical one, our framework has been implemented, and it is ready to be deployed and complement any existint MCS system
Privacy-aware secured discrete framework in wireless sensor network
Rapid expansion of wireless sensor network-internet of things (WSN-IoT) in terms of application and technologies has led to wide research considering efficiency and security aspects. Considering the efficiency approach such as data aggregation along with consensus mechanism has been one of the efficient and secure approaches, however, privacy has been one of major concern and it remains an open issue due to low classification and high misclassification rate. This research work presents the privacy and reliable aware discrete (PRD-aggregation) framework to protect and secure the privacy of the node. It works by initializing the particular variable for each node and defining the threshold; further nodes update their state through the functions, and later consensus is developed among the sensor nodes, which further updates. The novelty of PRD is discretized transmission for efficiency and security. PRD-aggregation offers reliability through efficient termination criteria and avoidance of transmission failure. PRD-aggregation framework is evaluated considering the number of deceptive nodes for securing the node in the network. Furthermore, comparative analysis proves the marginal improvisation in terms of discussed parameter against the existing protocol
Crowdsensing Application on Coalition Game Using GPS and IoT Parking in Smart Cities
This paper provides an overview of crowdsensing and some of its applications. Crowdsensing is a part of the collecting data situations also; it’s built on a data system on multiple customer interactions. Moreover, writing the general information of the smart cities can be used to boost to received number frequency to send messages. This work mentioned the Crowdsensing layers that describe Mobile crowdsensing. The article focuses on crowdsensing layers, developed an application in Coalition Game using crowdsensing in terms of GPS. In addition, this paper discussed the Mobile crowdsensing system and how important the cloud is in serving the wireless network, the Internet of things (IoT), and data collection. Furthermore, this research also has developed a smart crowdsensing parking system that will help by reducing the time-wasting users
Quality control and cost management in crowdsourcing
By harvesting online workers’ knowledge, crowdsourcing has become an efficient and cost-effective way to obtain a large amount of labeled data for solving human intelligent tasks (HITs), such as entity resolution and sentiment analysis. Due to the open nature of crowdsourcing, online workers with different knowledge backgrounds may provide conflicting labels to tasks. Therefore, it is a common practice to perform a pre-determined number of assignments, either per task or for all tasks, and aggregate collected labels to infer the true label of tasks. This model could suffer from poor accuracy in case of under-budget or a waste of resource in case of over-budget. In addition, as worker labels are usually aggregated in a voting manner, crowdsourcing systems are vulnerable to strategic Sybil attack, where the attacker may manipulate several robot Sybil workers to share randomized labels for outvoting independent workers and apply various strategies to evade Sybil detection. In this thesis, we are specifically interested in providing a guaranteed aggregation accuracy with minimum worker cost and defending against strategic Sybil attack. In our first work, we assume that workers are independent and honest. By enforcing a specified accuracy threshold on aggregated labels and minimizing the worker cost under this requirement, we formulate the dual requirements for quality and cost as a Guaranteed Accuracy Problem (GAP) and present an efficient task assignment algorithm for solving the problem. In our second work, we assume that strategic Sybil attackers may coordinate Sybil workers to obtain rewards without honestly labeling tasks and apply different strategies to evade detection. By camouflaging golden tasks (i.e., tasks with known true labels) from the attacker and suppressing the impact of Sybil workers and low-quality independent workers, we extend the principled truth discovery to defend against strategic Sybil attack in crowdsorucing. For both works, we conduct comprehensive empirical evaluations on real and synthetic datasets to demonstrate the effectiveness and efficiency of our methods
Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices
Home appliance manufacturers strive to obtain feedback from users to improve
their products and services to build a smart home system. To help manufacturers
develop a smart home system, we design a federated learning (FL) system
leveraging the reputation mechanism to assist home appliance manufacturers to
train a machine learning model based on customers' data. Then, manufacturers
can predict customers' requirements and consumption behaviors in the future.
The working flow of the system includes two stages: in the first stage,
customers train the initial model provided by the manufacturer using both the
mobile phone and the mobile edge computing (MEC) server. Customers collect data
from various home appliances using phones, and then they download and train the
initial model with their local data. After deriving local models, customers
sign on their models and send them to the blockchain. In case customers or
manufacturers are malicious, we use the blockchain to replace the centralized
aggregator in the traditional FL system. Since records on the blockchain are
untampered, malicious customers or manufacturers' activities are traceable. In
the second stage, manufacturers select customers or organizations as miners for
calculating the averaged model using received models from customers. By the end
of the crowdsourcing task, one of the miners, who is selected as the temporary
leader, uploads the model to the blockchain. To protect customers' privacy and
improve the test accuracy, we enforce differential privacy on the extracted
features and propose a new normalization technique. We experimentally
demonstrate that our normalization technique outperforms batch normalization
when features are under differential privacy protection. In addition, to
attract more customers to participate in the crowdsourcing FL task, we design
an incentive mechanism to award participants.Comment: This paper appears in IEEE Internet of Things Journal (IoT-J
Attacking Spectrum Sensing With Adversarial Deep Learning in Cognitive Radio-Enabled Internet of Things
Cognitive radio-based Internet of Things (CR-IoT) network provides a solution for IoT devices to efficiently utilize spectrum resources. Spectrum sensing is a critical problem in CR-IoT network, which has been investigated extensively based on deep learning (DL). Despite the unique advantages of DL in spectrum sensing, the black-box and unexplained properties of deep neural networks may lead to many security risks. This article considers the fusion of traditional interference methods and data poisoning which is an attack method on the training data of a machine learning tool. We propose a new adversarial attack for reducing the sensing accuracy in DL-based spectrum sensing systems. We introduce a novel design of jamming waveform whose interference capability is reinforced by data poisoning. Simulation results show that significant performance enhancement and higher mobility can be achieved compared with traditional white-box attack methods
- …