
- 124 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Privacy and Security for Mobile Crowdsourcing
About this book
This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications. Discussed approaches help build intuition to apply these concepts to a broad range of system security domains toward dimensioning of next generations of mobiles crowdsensing applications. This book offers vigorous techniques as well as new insights for both beginners and seasoned professionals. It reflects on recent advances and research achievements.
Technical topics discussed in the book include but are not limited to:
- Risks affecting crowdsensing platforms
- Spatio-temporal privacy of crowdsourced applications
- Differential privacy for data mining crowdsourcing
- Blockchain-based crowdsourcing
- Secure wireless mobile crowdsensing.
This book is accessible to readers in mobile computer/communication industries as well as academic staff and students in computer science, electrical engineering, telecommunication systems, business information systems, and crowdsourced mobile app developers.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Half Title Page
- Series Page
- Title Page
- Copyright Page
- Table of Contents
- Preface
- List of Figures
- List of Tables
- List of Abbreviations
- Introduction
- 1 The Importance of Crowdsourcing
- 2 Spatio-temporal Privacy of Crowdsourced Applications
- 3 Differentially Private Mobile Crowdsourcing
- 4 Trust in Edge- and Fog-based Vehicular Crowdsensing
- 5 Blockchain-based Solutions for Security and Privacy of MCS Systems
- 6 MCS Security Games and Incentive Mechanisms
- 7 Machine Learning Based Privacy/Security Solutions for MCS
- 8 Crowdsourced Mobile Apps
- 9 Reliable Industrial IoT using Crowdsourcing
- 10 Misinformation, Fake News, and Crowdsourcing
- 11 Security in 6G and Wi-Fi Communications Leveraging Mobile Crowdsensing
- Problems
- Index
- About the Author