[1] |
WANG D X , HUANG C H , SHEN X Y ,et al. A general location-authentication based secure participant recruitment scheme for vehicular crowdsensing[J]. Computer Networks, 2020,171:107152.
|
[2] |
MAISONNEUVE N , STEVENS M , NIESSEN M E ,et al. NoiseTube:measuring and mapping noise pollution with mobile phones[C]// Information Technologies in Environmental Engineering. Berlin:Springer, 2009: 215-228.
|
[3] |
CAI J L Z , YAN M Y , LI Y S . Using crowdsourced data in location-based social networks to explore influence maximization[C]// Proceedings of the 35th Annual IEEE International Conference on Computer Communications. Piscataway:IEEE Press, 2016: 1-9.
|
[4] |
ASUQUO P , CRUICKSHANK H , MORLEY J ,et al. Security and privacy in location-based services for vehicular and mobile communications:an overview,challenges,and countermeasures[J]. IEEE Internet of Things Journal, 2018,5(6): 4778-4802.
|
[5] |
GUPTA R , RAO U P . An exploration to location based service and its privacy preserving techniques:a survey[J]. Wireless Personal Communications, 2017,96(2): 1973-2007.
|
[6] |
CHERIAN J , LUO J , GUO H L ,et al. ParkGauge:gauging the occupancy of parking garages with crowdsensed parking characteristics[C]// Proceedings of 2016 17th IEEE International Conference on Mobile Data Management. Piscataway:IEEE Press, 2016: 92-101.
|
[7] |
GONG W , ZHANG B X , LI C . Location-based online task assignment and path planning for mobile crowdsensing[J]. IEEE Transactions on Vehicular Technology, 2019,68(2): 1772-1783.
|
[8] |
HE W B , LIU X , REN M . Location cheating:a security challenge to location-based social network services[C]// Proceedings of 2011 31st International Conference on Distributed Computing Systems. Piscataway:IEEE Press, 2011: 740-749.
|
[9] |
CHEN Y L , WANG X J , YANG Y L ,et al. Location-aware Wi-Fi authentication scheme using smart contract[J]. Sensors, 2020,20(4): 1062.
|
[10] |
NOSOUHI M R , SOOD K , YU S ,et al. PASPORT:a secure and private location proof generation and verification framework[J]. IEEE Transactions on Computational Social Systems, 2020,7(2): 293-307.
|
[11] |
ZHU Z C , CAO G H . APPLAUS:a privacy-preserving location proof updating system for location-based services[C]// Proceedings of IEEE INFOCOM. Piscataway:IEEE Press, 2011: 1889-1897.
|
[12] |
MITROKOTSA A , PERIS-LOPEZ P , DIMITRAKAKIS C ,et al. On selecting the nonce length in distance-bounding protocols[J]. The Computer Journal, 2013,56(10): 1216-1227.
|
[13] |
XU G W , LI H W , TAN C ,et al. Achieving efficient and privacy-preserving truth discovery in crowd sensing systems[J]. Computers& Security, 2017,69: 114-126.
|
[14] |
ZHANG R , ZHANG J X , ZHANG Y C ,et al. Secure crowdsourcing-based cooperative pectrum sensing[C]// Proceedings of IEEE INFOCOM. Piscataway:IEEE Press, 2013: 2526-2534.
|
[15] |
PENG D , WU F , CHEN G H . Pay as how well you do:a quality based incentive mechanism for crowdsensing[C]// Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York:ACM Press, 2015: 177-186.
|
[16] |
XIAO M J , AN B Y , WANG J ,et al. CMAB-based reverse auction for unknown worker recruitment in mobile crowdsensing[J]. IEEE Transactions on Mobile Computing, 2021,21(10): 3502-3518.
|
[17] |
WU X C , SUN Y E , DU Y ,et al. An anti-malicious task allocation mechanism in crowdsensing systems[J]. Future Generation Computer Systems, 2022,127: 347-361.
|
[18] |
TALASILA M , CURTMOLA R , BORCEA C . Mobile crowd sensing[M]. Boca Raton: CRC Press, 2015.
|
[19] |
REDDY S , ESTRIN D , SRIVASTAVA M . Recruitment framework for participatory sensing data collections[C]// International Conference on Pervasive Computing. Berlin:Springer, 2010: 138-155.
|
[20] |
HE Z J , CAO J N , LIU X F . High quality participant recruitment in vehicle-based crowdsourcing using predictable mobility[C]// Proceedings of 2015 IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2015: 2542-2550.
|
[21] |
CHANDRAN N , GOYAL V , MORIARTY R ,et al. Position based cryptography[C]// Annual International Cryptology Conference. Berlin:Springer, 2009: 391-407.
|
[22] |
YANG R P , XU Q L , AU M H ,et al. Position based cryptography with location privacy:a step for fog computing[J]. Future Generation Computer Systems, 2018,78: 799-806.
|
[23] |
BRANDS S , CHAUM D . Distance-bounding protocols[C]// Workshop on the Theory and Application of of Cryptographic Techniques. Berlin:Springer, 1993: 344-359.
|
[24] |
WANG X L , PANDE A , ZHU J D ,et al. STAMP:enabling privacy-preserving location proofs for mobile users[J]. IEEE/ACM Transactions on Networking, 2016,24(6): 3276-3289.
|
[25] |
ZHU Z C , CAO G H . Toward privacy preserving and collusion resistance in a location proof updating system[J]. IEEE Transactions on Mobile Computing, 2013,12(1): 51-64.
|
[26] |
LIU S S , YAN Z , KANTOLA R . Privacy-preserving D2D cooperative location verification[C]// Proceedings of 2021 IEEE Global Communications Conference. Piscataway:IEEE Press, 2021: 1-6.
|
[27] |
KOUNAS D , VOUTYRAS O , PALAIOKRASSAS G ,et al. QuietPlace:an ultrasound-based proof of location protocol with strong identities[J]. Applied System Innovation, 2020,3(2): 19.
|
[28] |
GAMBS S , KILLIJIAN M O , ROY M ,et al. PROPS:a PRivacy-preserving location proof system[C]// Proceedings of 2014 IEEE 33rd International Symposium on Reliable Distributed Systems. Piscataway:IEEE Press, 2014: 1-10.
|
[29] |
DESMEDT Y , . Major security problems with the ‘unforgeable’(feige)fiat-shamir proofs of identity and how to overcome them[C]// Proceedings of SECURICOM.[S.l.:s.n.], 1988: 15-17.
|
[30] |
BAGGA P , DAS A K , WAZID M ,et al. On the design of mutual authentication and key agreement protocol in Internet of vehicles-enabled intelligent transportation system[J]. IEEE Transactions on Vehicular Technology, 2021,70(2): 1736-1751.
|