[go: up one dir, main page]

Next Article in Journal
Enhancing Blended Learning Evaluation Through a Blockchain and Searchable Encryption Approach
Previous Article in Journal
Efficient Optimization Method of the Meshed Return Plane Through Fusion of Convolutional Neural Network and Improved Particle Swarm Optimization
Previous Article in Special Issue
Vulnerability Assessment and Topology Reconstruction of Task Chains in UAV Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Editorial

Data Privacy and Cybersecurity in Mobile Crowdsensing

1
School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing 100081, China
2
School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China
3
School of Electronic and Information Engineering, Beijing Jiaotong University, Beijing 100044, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(5), 1038; https://doi.org/10.3390/electronics14051038
Submission received: 19 February 2025 / Accepted: 27 February 2025 / Published: 5 March 2025
(This article belongs to the Special Issue Data Privacy and Cybersecurity in Mobile Crowdsensing)
Mobile crowdsensing (MCS) has emerged as a pivotal element in contemporary communication technology, witnessing substantial growth recently. The advent of 5G [1], the Internet of Things (IoT) [2], and edge computing [3] has propelled MCS to achieve enhanced sensing efficiency and broaden its application spectrum across various domains such as environmental monitoring [4], traffic management [5], and healthcare [6].
However, despite these advantages, MCS confronts significant security and privacy challenges due to its open and diverse nature. Critical concerns encompass data leakage [7,8,9,10], unauthorized access [11,12], data tampering [13,14], and cross-network attacks [15,16]. These issues can severely compromise the stability, privacy, and security of MCS systems. Furthermore, the dynamic mobility of users and devices within MCS introduces additional complexity to conventional security measures, particularly concerning communication and cross-domain access control [17,18].
To tackle these challenges, researchers have devised several strategies aimed at bolstering the security and privacy of MCS systems [19,20,21]. These novel protection mechanisms offer distinct benefits over traditional approaches. They are capable of securing data even with constrained computational and communication resources, enhancing system flexibility, and effectively thwarting sophisticated cyberattacks. These strategies provide both theoretical and practical underpinnings for fortifying MCS security and lay a robust foundation for the field’s future evolution.
As concerns over data privacy and cybersecurity increase [22,23], numerous researchers have proffered innovative solutions in the realms of mobile sensing, the Internet of Things (IoT), and federated learning, with the aim of safeguarding data privacy and bolstering system security. Regarding the protection mechanism for UAV network task chains, Contribution 1 introduces a UAV network mission chain protection mechanism grounded in vulnerability analysis and topology reconfiguration. By employing the multi-indicator node vulnerability assessment algorithm and the node importance-based topology reconfiguration algorithm, this research can effectively pinpoint critical nodes and optimize network topology to enhance both reliability and security. In the domain of recommender systems, Contribution 2 advances a differential privacy-based federated recommendation framework that safeguards user privacy while preserving recommendation accuracy through the addition of noise to model updates. The study substantiates the efficacy of the framework across various datasets experimentally. In Contribution 3, the authors propose an innovative federated recommendation framework that integrates differential privacy techniques to protect user privacy without compromising recommendation accuracy. To fortify privacy protection further, the authors also devise a specialized differential privacy algorithm for ensuring that individual user information cannot be inferred from the global model by meticulously calibrated noise added to aggregated data updates. Moreover, addressing privacy protection challenges within the Internet of Vehicles [24,25], Contribution 4 puts forth a consensus mechanism based on proof-of-multiple-state. This mechanism leverages blockchain technology to resolve data security and privacy issues in vehicular networking while optimizing communication efficiency among mobile nodes. The PoMS mechanism utilizes vehicle driving state predictions and machine learning models to dynamically adjust node weights and select optimal relay nodes, thereby enhancing both the efficiency and security of network communications.
In the realm of affective speech generation, Contribution 5 introduces a method for generating high-quality affective speech data by integrating affective embedding and phonological style embedding. Utilizing the Mel spectrogram as an input, this method generates affective speech through a diffusion process. Addressing challenges in mobile sensors and localization problems, Contribution 7 proposes a multi-source sparse inverse localization technique based on mobile sensors. This approach targets signal source localization issues within long-distance mobile sensor networks. Additionally, a long-range localization method grounded in the block sparse model is presented, along with a unilateral branching ratio decision algorithm designed to adaptively control the iterative process amidst unknown sparsity levels. Building upon these advancements, Contribution 6 presents a swell neural network algorithm tailored for resolving time-varying path query problems while considering privacy protection. The algorithm efficiently identifies multiple paths, including the shortest path, while safeguarding user privacy. It also designs an encrypted indexing scheme to effectively prevent the leakage of user information. Targeting concerns related to privacy breaches and malicious disruptions in electronic voting systems [26,27], Contribution 8 proposes an efficient e-voting system leveraging homomorphic encryption. An enhanced HSE-Voting system is designed, which fortifies system security by incorporating signatures and partial proof-of-knowledge protocols, simultaneously reducing computational costs for proxies. This improved system ensures the accuracy and verifiability of election outcomes while preserving voter privacy.
To tackle the escalating issue of copyright infringement in models [28,29], Contribution 9 introduces a framework named PTFCP. This framework is meticulously designed to counteract the burgeoning threat of model copyright infringement. By leveraging cryptographic technologies, PTFCP facilitates privacy-preserving similarity assessments between victim and suspect models without disclosing sensitive details. In genomics research, Contribution 10 presents MLPPF, a method for the multi-tagging prediction of piRNA function. MLPPF demonstrates its efficacy by efficiently identifying mRNA-associated and lncRNA-associated markers of piRNA function, thereby revealing pivotal elements within piRNA sub-sequences. Regarding WiFi gesture recognition, Contribution 11 addresses cross-domain challenges through an innovative combination of knowledge distillation and Jensen–Shannon scattering techniques. Within the domain of mobile sensors, Contribution 12 proposes a secure certificate signing scheme tailored for resource-constrained devices. This scheme innovates with a novel public key structure that obviates the need for pairing operations. Furthermore, Contribution 13 unveils a pioneering IoT intrusion detection scheme. This scheme harnesses a cutting-edge neural network algorithm to adeptly manage large-scale, heterogeneous, high-dimensional, and time-dependent IoT network traffic data. Lastly, addressing the key management conundrum in identity-based cryptography, Contribution 14 advances a new certificateless signature scheme. This scheme extends the SM2 algorithm into a certificateless context, effectively resolving key management issues while enabling the batch verification of multiple signatures.
In the realm of big data management for IoT, Contribution 15 advances a novel strategy dedicated to safeguarding privacy across extensive networks of systems. This approach ensures the robust protection of both data and model privacy through the synergistic integration of distributed model training and secure model aggregation. Addressing multiple ciphertext equivalence testing, Contribution 16 introduces a certificateless encryption concept that facilitates multiple ciphertext equivalence testing with agent-assisted authorization. The proposed scheme fortifies security by enabling concurrent equivalence tests on numerous ciphertexts while incorporating an innovative agent-assisted authorization mechanism. Within the Internet of Vehicles, Contribution 17 unveils an efficient and secure blockchain consensus protocol. This protocol integrates a trust assessment mechanism, node partition strategy, and Dynamic Unique Node List to significantly enhance reliability and adaptability within IoV environments. Furthermore, it presents dynamic K-medoid practical byzantine fault tolerance—an optimized practical byzantine fault tolerance algorithm—designed to minimize latency and boost throughput efficiency.
In terms of energy efficiency and privacy preservation, Contribution 18 combines a federated learning framework with a pulsed neural network and differential privacy techniques to significantly reduce energy consumption and enhance privacy preservation for large-scale cross-device learning. Regarding blockchain-based privacy protection [30], Contribution 19 introduces privacy-preserving rewritable blockchain. This innovative approach supports flexible policies through an enhanced identity encryption scheme, batch policy support, and improved accountability traceability via a proxy re-encryption mechanism. For privacy protection within mobile crowdsensing applications, Contribution 20 presents PRBFM—a privacy-preserving blockchain framework grounded in thresholded linear secret sharing. By optimizing privacy protection and efficiency through sophisticated policy matching and task delegation mechanisms, this framework sets a new standard in secure data management.
In addressing the challenge of task allocation in spatial crowdsourcing [31], Contribution 21 introduces PKGS—a privacy-preserving hitchhiking task assignment scheme. Leveraging the Paillier cryptosystem, PKGS enables secure computation over encrypted data to safeguard the privacy of both workers and task locations. This innovative approach incorporates a privacy-preserving travel distance calculation protocol and a privacy-preserving comparison protocol to facilitate efficient task assignment while maintaining strict confidentiality. Within the domain of federated learning, Contribution 22 unveils FRIMFL—a fair and reliable incentive mechanism rooted in reverse auctions and reputation trust. Designed to ensure robust client participation and equitable reward distribution, this mechanism incentivizes truthful bidding through integrated reverse auctions. Additionally, it employs a trust-based reputation system to assess the quality of contributions. The proposed method features a weighted trust assessment technique for reliability measurement and utilizes the Shapley value method to allocate rewards fairly based on marginal contributions. Simultaneously, Contribution 23 presents EPTA-T, an advanced task assignment scheme that amalgamates temporal access control with attribute-based encryption. By harnessing an attribute-based encryption framework enhanced by function integration, EPTA-T supports granular and time-bound access control. This ensures effective protection of data privacy during task allocation and significantly enhances overall efficiency. Lastly, tackling the issue of privacy-preserving frequent itemset mining on cloud servers, Contribution 24 proposes PPFIM—a verifiable privacy-preserving frequent itemset mining protocol. Through a dual-cloud architecture and encrypted databases, PPFIM mitigates data leakage risks and fortifies system security, thereby providing a robust solution for preserving privacy in large-scale data analysis tasks.

Funding

This work is financially supported by the National Natural Science Foundation of China (Grant Nos. 62202051 and 62232002), the China Postdoctoral Science Foundation (Grant Nos. 2021M700435 and 2021TQ0042), the Open Project Funding of the Key Laboratory of Mobile Application Innovation and Governance Technology, the Ministry of Industry and Information Technology (Grant No. 20231FS080601-K), the Beijing Institute of Technology Research and Innovation Promoting Project (Grant No. 2023YCXY010), the Beijing Institute of Technology Research Fund Program for Young Scholars, and the Young Elite Scientists Sponsorship Program by CAST (Grant No. 2023QNRC001).

Data Availability Statement

No new data were created or analyzed in this study.

Conflicts of Interest

The authors declare no conflicts of interest.

List of Contributions

References

  1. Wang, Z.; Cao, Y.; Jiang, K.; Zhou, H.; Kang, J.; Zhuang, Y.; Tian, D.; Leung, V.C. When Crowdsensing Meets Smart Cities: A Comprehensive Survey and New Perspectives. IEEE Commun. Surv. Tutor. 2024. early access. [Google Scholar] [CrossRef]
  2. Liu, K.; Peng, S.; Gong, W.; Zhang, B.; Li, C. Hybrid user based task assignment for mobile crowdsensing: Problem and algorithm. IEEE Internet Things J. 2024, 11, 19589–19601. [Google Scholar] [CrossRef]
  3. Deng, L.; Gong, W.; Liwang, M.; Li, L.; Zhang, B.; Li, C. Towards Intelligent Mobile Crowdsensing With Task State Information Sharing over Edge-Assisted UAV Networks. IEEE Trans. Veh. Technol. 2024, 73, 11773–11788. [Google Scholar] [CrossRef]
  4. Yu, Z.; Zhao, L.; Cui, H.; Song, Y.; Liu, Y.; Luo, Y.; Guo, B. CrowdKit: A Generic Programming Framework for Mobile Crowdsensing Applications. IEEE Trans. Mob. Comput. 2024, 23, 10584–10597. [Google Scholar] [CrossRef]
  5. Jiang, Z.; Zhu, H.; Zhou, B.; Lu, C.; Sun, M.; Ma, X.; Fan, X.; Wang, C.; Chen, L. CrowdPatrol: A mobile crowdsensing framework for traffic violation hotspot patrolling. IEEE Trans. Mob. Comput. 2021, 22, 1401–1416. [Google Scholar] [CrossRef]
  6. Wang, W.; Yang, Y.; Xiong, Z.; Niyato, D. Footstone of metaverse: A timely and secure crowdsensing. IEEE Netw. 2023, 38, 171–178. [Google Scholar] [CrossRef]
  7. Zhang, M.; Chen, S.; Shen, J.; Susilo, W. Privacyeafl: Privacy-enhanced aggregation for federated learning in mobile crowdsensing. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5804–5816. [Google Scholar] [CrossRef]
  8. Zhao, B.; Li, X.; Liu, X.; Pei, Q.; Li, Y.; Deng, R.H. CrowdFA: A privacy-preserving mobile crowdsensing paradigm via federated analytics. IEEE Trans. Inf. Forensics Secur. 2023, 18, 5416–5430. [Google Scholar] [CrossRef]
  9. An, J.; Ren, Y.; Li, X.; Zhang, M.; Luo, B.; Miao, Y.; Liu, X.; Deng, R.H. Privacy-preserving user recruitment with sensing quality evaluation in mobile crowdsensing. IEEE Trans. Dependable Secur. Comput. 2024, 22, 787–803. [Google Scholar] [CrossRef]
  10. Wu, A.; Luo, W.; Yang, A.; Zhang, Y.; Zhu, J. Efficient bilateral privacy-preserving data collection for mobile crowdsensing. IEEE Trans. Serv. Comput. 2023, 17, 865–877. [Google Scholar] [CrossRef]
  11. Yu, R.; Oguti, A.M.; Obaidat, M.S.; Li, S.; Wang, P.; Hsiao, K.F. Blockchain-based solutions for mobile crowdsensing: A comprehensive survey. Comput. Sci. Rev. 2023, 50, 100589. [Google Scholar] [CrossRef]
  12. Agrawal, A.; Choudhary, S.; Bhatia, A.; Tiwari, K. Pub-SubMCS: A privacy-preserving publish–subscribe and blockchain-based mobile crowdsensing framework. Future Gener. Comput. Syst. 2023, 146, 234–249. [Google Scholar] [CrossRef]
  13. Cheng, Y.; Ma, J.; Liu, Z.; Li, Z.; Wu, Y.; Dong, C.; Li, R. A privacy-preserving and reputation-based truth discovery framework in mobile crowdsensing. IEEE Trans. Dependable Secur. Comput. 2023, 20, 5293–5311. [Google Scholar] [CrossRef]
  14. Zhang, S.; Li, Z.; Liang, W.; Li, K.C.; Bhuiyan, Z.A. Blockchain-Based Hybrid Reliable User Selection Scheme for Task Allocation in Mobile Crowd Sensing. IEEE Trans. Netw. Sci. Eng. 2024, 11, 6494–6510. [Google Scholar] [CrossRef]
  15. Wang, T.; Shen, H.; Chen, J.; Chen, F.; Wu, Q.; Xie, D. A hybrid blockchain-based identity authentication scheme for Mobile Crowd Sensing. Future Gener. Comput. Syst. 2023, 143, 40–50. [Google Scholar] [CrossRef]
  16. Zheng, Z.; Li, Z.; Huang, C.; Long, S.; Shen, X. Defending Data Poisoning Attacks in DP-Based Crowdsensing: A Game-Theoretic Approach. IEEE Trans. Mob. Comput. 2024, 24, 1859–1876. [Google Scholar] [CrossRef]
  17. Liu, Y.; Yu, Z.; Cui, H.; Helal, S.; Guo, B. SafeCity: A Heterogeneous Mobile Crowd Sensing System for Urban Public Safety. IEEE Internet Things J. 2023, 10, 18330–18345. [Google Scholar] [CrossRef]
  18. Zhao, G.; Wang, X.; Wang, J.; Liu, J. Task recommendation for mobile crowd sensing system based on multi-view user dynamic behavior prediction. Peer-Netw. Appl. 2023, 16, 1536–1550. [Google Scholar] [CrossRef]
  19. Zeng, H.; Xiong, Y.; She, J.; Yu, A. A Task Assignment Scheme Designed for Online Urban Sensing Based on Sparse Mobile Crowdsensing. IEEE Internet Things J. 2025. early access. [Google Scholar] [CrossRef]
  20. Peng, S.; Zhang, G.; Zhang, B.; Yao, Z.; Liu, C.; Li, C. A Stable Task Assignment Mechanism for Multi-Platform Mobile Crowdsensing. IEEE Trans. Veh. Technol. 2025. early access. [Google Scholar] [CrossRef]
  21. Guo, Q.; He, Y.; Li, Q.; Liu, A.; Xiong, N.N.; He, Q.; Yang, Q.; Zhang, S. PPAT: An effective scheme ensuring privacy-preserving, accuracy, and trust for worker selection in mobile crowdsensing networks. Future Gener. Comput. Syst. 2025, 163, 107536. [Google Scholar] [CrossRef]
  22. Kim, J.W.; Edemacu, K.; Jang, B. Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey. J. Netw. Comput. Appl. 2022, 200, 103315. [Google Scholar] [CrossRef]
  23. Suhag, D.; Jha, V. A comprehensive survey on mobile crowdsensing systems. J. Syst. Archit. 2023, 142, 102952. [Google Scholar] [CrossRef]
  24. Wang, N.; Yang, W.; Wang, X.; Wu, L.; Guan, Z.; Du, X.; Guizani, M. A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. Digit. Commun. Networks 2024, 10, 126–134. [Google Scholar] [CrossRef]
  25. Al Sibahee, M.A.; Nyangaresi, V.O.; Abduljabbar, Z.A.; Luo, C.; Zhang, J.; Ma, J. Two-Factor Privacy Preserving Protocol for Efficient Authentication in Internet of Vehicles Networks. IEEE Internet Things J. 2023, 11, 14253–14266. [Google Scholar] [CrossRef]
  26. Haines, T.; Mueller, J.; Mosaheb, R.; Pryvalov, I. Sok: Secure e-voting with everlasting privacy. In Proceedings of the Privacy Enhancing Technologies Symposium (PETS), Lausanne, Switzerland and Online, 10–15 July 2023. [Google Scholar]
  27. Shankar, A.; Pandiaraja, P.; Sumathi, K.; Stephan, T.; Sharma, P. Privacy preserving E-voting cloud system based on ID based encryption. Peer-Netw. Appl. 2021, 14, 2399–2409. [Google Scholar] [CrossRef]
  28. Zhang, X.; Li, R.; Yu, J.; Xu, Y.; Li, W.; Zhang, J. Editguard: Versatile image watermarking for tamper localization and copyright protection. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, Seattle, WA, USA, 16–22 June 2024; pp. 11964–11974. [Google Scholar]
  29. Zhang, X.; Xu, Y.; Li, R.; Yu, J.; Li, W.; Xu, Z.; Zhang, J. V2a-mark: Versatile deep visual-audio watermarking for manipulation localization and copyright protection. In Proceedings of the 32nd ACM International Conference on Multimedia, Melbourne, VIC, Australia, 28 October–1 November 2024; pp. 9818–9827. [Google Scholar]
  30. Ferrag, M.A.; Shu, L. The performance evaluation of blockchain-based security and privacy systems for the Internet of Things: A tutorial. IEEE Internet Things J. 2021, 8, 17236–17260. [Google Scholar] [CrossRef]
  31. Wang, L.; Yu, Z.; Wu, K.; Yang, D.; Wang, E.; Wang, T.; Mei, Y.; Guo, B. Towards robust task assignment in mobile crowdsensing systems. IEEE Trans. Mob. Comput. 2022, 22, 4297–4313. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, C.; Wu, T.; Zhang, W. Data Privacy and Cybersecurity in Mobile Crowdsensing. Electronics 2025, 14, 1038. https://doi.org/10.3390/electronics14051038

AMA Style

Zhang C, Wu T, Zhang W. Data Privacy and Cybersecurity in Mobile Crowdsensing. Electronics. 2025; 14(5):1038. https://doi.org/10.3390/electronics14051038

Chicago/Turabian Style

Zhang, Chuan, Tong Wu, and Weiting Zhang. 2025. "Data Privacy and Cybersecurity in Mobile Crowdsensing" Electronics 14, no. 5: 1038. https://doi.org/10.3390/electronics14051038

APA Style

Zhang, C., Wu, T., & Zhang, W. (2025). Data Privacy and Cybersecurity in Mobile Crowdsensing. Electronics, 14(5), 1038. https://doi.org/10.3390/electronics14051038

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop