Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks

@inproceedings{Konidala2013AnonymousAO,
  title={Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks},
  author={Divyan M. Konidala and Robert H. Deng and Yingjiu Li and Hoong Chuin Lau and Stephen E. Fienberg},
  booktitle={ISPEC},
  year={2013}
}
In this paper we focus on authentication and privacy aspects of an application scenario that utilizes mobile crowd sensing for the benefit of amusement park operators and their visitors. The scenario involves a mobile app that gathers visitors’ demographic details, preferences, and current location coordinates, and sends them to the park’s sever for various analyses. These analyses assist the park operators to efficiently deploy their resources, estimate waiting times and queue lengths, and… 
Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation
TLDR
A location privacy-preserving solution for the mobile crowd sensing (MCS) system that makes use of the blind signature technique for anonymous authentication and allows a mobile user to participate in the MCS for certain times set in the registration is given.
Privacy-Preserving Mechanisms for Crowdsensing: Survey and Research Challenges
TLDR
The most important issues to consider in the design, implementation, and evaluation of privacy-preserving mechanisms for CS systems are addressed and the most important mechanisms available in the literature are described and qualitatively evaluated.
Data-Oriented Mobile Crowdsensing: A Comprehensive Survey
TLDR
This survey aims to provide a comprehensive literature review on recent advances in MCS, and surveys researches from five popular aspects in three stages: 1) incentive mechanism; 2) security protection; and 3) privacy preserving, together with resource optimization in the data collection stage; the data analysis stage; and the data application stage.
Provisioning Privacy and Accountability in Participatory Sensing
TLDR
This work proposes an extension to an existing MCS architecture which takes care of privacy and accountability and security analysis of the architecture is presented.
On Data Persistence Models for Mobile Crowdsensing Applications
TLDR
The main goal of the research is to propose a software architecture for mobile crowdsensing in Smart City services and provide a review of the data persistence solutions (back-end systems, data stores, etc.) forMobile crowdsensing applications.
Resource Clogging Attacks in Mobile Crowd-Sensing: AI-based Modeling, Detection and Mitigation
TLDR
This thesis proposes a systematical study of fake task injection in MCS, including modeling, detection, and mitigation of such resource clogging attacks, and introduces Machine Learning methods into the MCS server to detect and eliminate the fake tasks.
Mobile Sensing Systems
TLDR
The main objective is to reduce the learning curve in mobile sensing systems where the complexity is very high.
TCNS: Node Selection With Privacy Protection in Crowdsensing Based on Twice Consensuses of Blockchain
TLDR
A decentralized privacy-preserving model based on twice verifications and consensuses of blockchain (TCNS) is proposed, and the experimental analysis of privacy protection and safety shows that TCNS can effectively prevent association analysis attacks and background knowledge attacks.
...
1
2
...

References

SHOWING 1-10 OF 29 REFERENCES
Location Cheating: A Security Challenge to Location-Based Social Network Services
  • Wenbo He, Xue Liu, Mai Ren
  • Computer Science
    2011 31st International Conference on Distributed Computing Systems
  • 2011
TLDR
This paper introduces a novel location cheating attack, which can easily pass the current location verification mechanism (e.g., cheater code of foursquare), and shows that automated large scale cheating is possible.
Using On-the-Move Mining for Mobile Crowdsensing
TLDR
This paper proposes and develops a platform to support data collection for mobile crowdsensing from mobile device sensors that is under-pinned by real-time mobile data stream mining, and experimentally demonstrates that mobile data mining is an effective and efficient strategy forMobile crowdsensing.
Mobile crowdsensing: current state and future challenges
TLDR
The need for a unified architecture for mobile crowdsensing is argued and the requirements it must satisfy are envisioned.
How to win the clonewars: efficient periodic n-times anonymous authentication
TLDR
A credential system that lets a user anonymously authenticate at most $n$ times in a single time period, based on e-cash, which can use existing techniques to identify a cheating user, trace all of her e-tokens, and revoke her dispensers.
Why eve and mallory love android: an analysis of android SSL (in)security
TLDR
An analysis of 13,500 popular free apps downloaded from Google's Play Market revealed that 1,074 (8.0%) of the apps examined contain SSL/TLS code that is potentially vulnerable to MITM attacks, and MalloDroid is introduced, a tool to detect potential vulnerability againstMITM attacks.
Web MIXes: A System for Anonymous and Unobservable Internet Access
TLDR
A MIX-based system for anonymous and unobservable real-time Internet access that prevents traffic analysis as well as flooding attacks and provides an interface to inform anonymous users about their level of anonymity and unob observability.
Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals
TLDR
This work presents constructions for which it can be proved, that no individual can cheat successfully, unless he possesses an algorithm that contradicts a single plausible intractability assumption.
The most dangerous code in the world: validating SSL certificates in non-browser software
TLDR
It is demonstrated that SSL certificate validation is completely broken in many security-critical applications and libraries and badly designed APIs of SSL implementations and data-transport libraries which present developers with a confusing array of settings and options are analyzed.
How to Date Blind Signatures
TLDR
It is proved that forging the proposed scheme by multiple signing is as difficult as breaking RSA and an electronic cash system is shown that successfully minimizes the growth of the bank's database.
Group Signatures
TLDR
A new type of signature for a group of persons, called a group signature, which has the following properties: only members of the group can sign messages; and if necessary, the signature can be "opened", so that the person who signed the message is revealed.
...
1
2
3
...