Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
A scalable and highly available web server
COMPCON '96 Proceedings of the 41st IEEE International Computer Conference
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
CarTel: a distributed mobile sensor computing system
Proceedings of the 4th international conference on Embedded networked sensor systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
WICON '06 Proceedings of the 2nd annual international workshop on Wireless internet
Preserving location privacy in wireless lans
Proceedings of the 5th international conference on Mobile systems, applications and services
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
IEEE Pervasive Computing
The Urbanet Revolution: Sensor Power to the People!
IEEE Pervasive Computing
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Adaptive contact probing mechanisms for delay tolerant applications
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Proceedings of the 14th ACM conference on Computer and communications security
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
The BikeNet mobile sensing system for cyclist experience mapping
Proceedings of the 5th international conference on Embedded networked sensor systems
AnonySense: Opportunistic and Privacy-Preserving Context Collection
Pervasive '08 Proceedings of the 6th International Conference on Pervasive Computing
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Virtual walls: protecting digital privacy in pervasive environments
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Objects calling home: locating objects using mobile phones
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
MobiSoC: a middleware for mobile social computing applications
Mobile Networks and Applications
Experimenting in mobile social contexts using JellyNets
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Wifi-reports: improving wireless network selection with collaboration
Proceedings of the 7th international conference on Mobile systems, applications, and services
Feeling-based location privacy protection for location-based services
Proceedings of the 16th ACM conference on Computer and communications security
A distortion-based metric for location privacy
Proceedings of the 8th ACM workshop on Privacy in the electronic society
DEAMON: energy-efficient sensor monitoring
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Fast track article: Bubble-sensing: Binding sensing tasks to the physical world
Pervasive and Mobile Computing
Preserving privacy in location-based mobile social applications
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Enabling pervasive mobile applications with the FM radio broadcast data system
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Preserving privacy in participatory sensing systems
Computer Communications
PRISM: platform for remote sensing using smartphones
Proceedings of the 8th international conference on Mobile systems, applications, and services
Trust-based data disclosure in sensor networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Prisense: privacy-preserving data aggregation in people-centric urban sensing systems
INFOCOM'10 Proceedings of the 29th conference on Information communications
Opportunistic strategies for lightweight signal processing for body sensor networks
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
Mobile location tracking in metro areas: malnets and others
Proceedings of the 17th ACM conference on Computer and communications security
HBCI: human-building-computer interaction
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building
Providing mobile users' anonymity in hybrid networks
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Jano: specification and enforcement of location privacy in mobile and pervasive environments
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
Location privacy in urban sensing networks: research challenges and directions
IEEE Wireless Communications
AnonySense: A system for anonymous opportunistic sensing
Pervasive and Mobile Computing
Distributed velocity-dependent protocol for multihop cellular sensor networks
EURASIP Journal on Wireless Communications and Networking
Short paper: PEPSI---privacy-enhanced participatory sensing infrastructure
Proceedings of the fourth ACM conference on Wireless network security
Anonygator: privacy and integrity preserving data aggregation
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
Sensorsafe: a framework for privacy-preserving management of personal sensory information
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Egobile: where social networks go mobile
Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services
Future Generation Computer Systems
Preserving query privacy in urban sensing systems
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Multimedia search over integrated social and sensor networks
Proceedings of the 21st international conference companion on World Wide Web
Koi: a location-privacy platform for smartphone apps
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Medusa: a programming framework for crowd-sensing applications
Proceedings of the 10th international conference on Mobile systems, applications, and services
Adaptive user anonymity for mobile opportunistic networks
Proceedings of the seventh ACM international workshop on Challenged networks
Using ontologies to reduce user intervention to deploy sensing campaigns with the InCense toolkit
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
SWAN-song: a flexible context expression language for smartphones
Proceedings of the Third International Workshop on Sensing Applications on Mobile Phones
GeoCrowd: enabling query answering with spatial crowdsourcing
Proceedings of the 20th International Conference on Advances in Geographic Information Systems
A multi-sensor mobile system based on agents for people monitoring
IWAAL'12 Proceedings of the 4th international conference on Ambient Assisted Living and Home Care
Radiator: context propagation based on delayed aggregation
Proceedings of the 2013 conference on Computer supported cooperative work
Pogo, a middleware for mobile phone sensing
Proceedings of the 13th International Middleware Conference
P3: toward privacy-preserving photo sharing
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
From the internet of things to embedded intelligence
World Wide Web
Scalable Data Processing for Community Sensing Applications
Mobile Networks and Applications
Managing smartphone testbeds with smartlab
LISA'13 Proceedings of the 27th international conference on Large Installation System Administration
Hi-index | 0.00 |
Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the, network world (with Wi-Fi and Bluetooth interfaces). Such devices offer many new opportunities for cooperative sensing applications. For example, users' mobile phones may contribute data to community-oriented information services, from city-wide pollution monitoring to enterprise-wide detection of unauthorized Wi-Fi access points. This people-centric mobile-sensing model introduces a new security challenge in the design of mobile systems: protecting the privacy of participants while allowing their devices to reliably contribute high-quality data to these large-scale applications. We describe AnonySense, a privacy-aware architecture for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows applications to submit sensing tasks that will be distributed across anonymous participating mobile devices, later receiving verified, yet anonymized, sensor data reports back from the field, thus providing the first secure implementation of this participatory sensing model. We describe our trust model, and the security properties that drove the design of the AnonySense system. We evaluate our prototype implementation through experiments that indicate the feasibility of this approach, and through two applications: a Wi-Fi rogue access point detector and a lost-object finder.