The knowledge complexity of interactive proof-systems
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
Witness indistinguishable and witness hiding protocols
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Cooperative Location-Sensing for Wireless Networks
PERCOM '04 Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom'04)
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Proceedings of the 11th ACM conference on Computer and communications security
Attack-resistant location estimation in sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Location-based trust for mobile user-generated content: applications, challenges and implementations
Proceedings of the 9th workshop on Mobile computing systems and applications
Nericell: rich monitoring of road and traffic conditions using mobile smartphones
Proceedings of the 6th ACM conference on Embedded network sensor systems
Location privacy based on trusted computing and secure logging
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Enabling new mobile applications with location proofs
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Not-a-Bot: improving service availability in the face of botnet attacks
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Towards trustworthy participatory sensing
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Are you contributing trustworthy data?: the case for a reputation system in participatory sensing
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
VeriPlace: a privacy-aware location proof architecture
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Dynamic pricing incentive for participatory sensing
Pervasive and Mobile Computing
Mobile apps: it's time to move up to CondOS
HotOS'13 Proceedings of the 13th USENIX conference on Hot topics in operating systems
SignalGuru: leveraging mobile phones for collaborative traffic signal schedule advisory
MobiSys '11 Proceedings of the 9th international conference on Mobile systems, applications, and services
Quality control for real-time ubiquitous crowdsourcing
Proceedings of the 2nd international workshop on Ubiquitous crowdsouring
YouProve: authenticity and fidelity in mobile sensing
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
FollowMe: enhancing mobile applications with open infrastructure sensing
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
Plug-n-trust: practical trusted sensing for mhealth
Proceedings of the 10th international conference on Mobile systems, applications, and services
Software abstractions for trusted sensors
Proceedings of the 10th international conference on Mobile systems, applications, and services
Advancing the state of mobile cloud computing
Proceedings of the third ACM workshop on Mobile cloud computing and services
Using trustworthy host-based information in the network
Proceedings of the seventh ACM workshop on Scalable trusted computing
DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows
ACM Transactions on Information and System Security (TISSEC)
Towards providing security for mobile games
Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture
Secure enrollment and practical migration for mobile trusted execution environments
Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices
The man who was there: validating check-ins in location-based services
Proceedings of the 29th Annual Computer Security Applications Conference
Security and privacy for augmented reality systems
Communications of the ACM
Hi-index | 0.02 |
Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera. This paper presents a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We present two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.