Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016 (2016), Article ID 6506341, 10 pages
http://dx.doi.org/10.1155/2016/6506341
Research Article

Protecting Mobile Crowd Sensing against Sybil Attacks Using Cloud Based Trust Management System

Department of Computer Science and Information Engineering, Tamkang University, New Taipei City 25137, Taiwan

Received 7 August 2015; Accepted 16 February 2016

Academic Editor: Jong-Hyouk Lee

Copyright © 2016 Shih-Hao Chang and Zhi-Rong Chen. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Ma, D. Zhao, and P. Yuan, “Opportunities in mobile crowd sensing,” IEEE Communications Magazine, vol. 52, no. 8, pp. 29–35, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. T. Denning, A. Andrew, R. Chaudhri et al., “BALANCE: towards a usable pervasive wellness application with accurate activity inference,” in Proceedings of the 10th Workshop on Mobile Computing Systems and Applications (HotMobile '09), vol. 5, pp. 15–16, Santa Cruz, Calif, USA, February 2009. View at Publisher · View at Google Scholar · View at Scopus
  3. E. P. Stuntebeck, J. S. Davis II, G. D. Abowd, and M. Blount, “HealthSense: classification of health-related sensor data through user-assisted machine learning,” in Proceedings of the 9th Workshop on Mobile Computing Systems and Applications (HotMobile '08), pp. 1–5, February 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. R. Douceur, “The Sybil attack,” in Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, Mass, USA, March 2002.
  5. X. Liang, X. Lin, and X. S. Shen, “Enabling trustworthy service evaluation in service-oriented mobile social networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 310–320, 2014. View at Publisher · View at Google Scholar · View at Scopus
  6. K. Zhang, X. Liang, R. Lu, and X. Shen, “Sybil attacks and their defenses in the internet of things,” IEEE Internet of Things Journal, vol. 1, no. 5, pp. 372–383, 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. I. Brandic, S. Dustdar, T. Anstett, D. Schumm, F. Leymann, and R. Konrad, “Compliant Cloud Computing (C3): architecture and language support for user-driven compliance management in Clouds,” in Proceedings of the 3rd IEEE International Conference on Cloud Computing (CLOUD '10), pp. 244–251, July 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Computing, vol. 14, no. 5, pp. 14–22, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. C. Ghali, A. Chehab, and A. Kayssi, “CATRAC: contextaware trust- and role-based access control for composite web services,” in Proceedings of the 10th IEEE International Conference on Computer and Information Technology, pp. 1085–1089, Bradford, UK, 2010.
  10. J. Grover, M. S. Gaur, V. Laxmi, and N. K. Prajapati, “A sybil attack detection approach using neighboring vehicles in VANET,” in Proceedings of the 4th International Conference on Security of Information and Networks (SIN '11), pp. 151–158, Sydney, Australia, November 2011. View at Publisher · View at Google Scholar · View at Scopus
  11. S. Ries, “Extending Bayesian trust models regarding context-dependence and user friendly representation,” in Proceedings of the 24th Annual ACM Symposium on Applied Computing (SAC '09), pp. 1294–1301, ACM Press, Honolulu, Hawaii, USA, March 2009. View at Publisher · View at Google Scholar
  12. S.-H. Chang and T.-S. Huang, “A fuzzy knowledge based fault tolerance algorithm in wireless sensor networks,” in Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA '12), pp. 891–896, IEEE, fukuoka, Japan, March 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. D. Jiang, Information Theory and Coding, Science and Technology of China University Press, 2001.
  14. S. F. Chen and Z. Q. Chen, Artificial Intelligence in Knowledge Engineering, Nanjing University Press, Nanjing, China, 1997.
  15. A. P. Muniyandi, R. Rajeshwari, and R. Rajaram, Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree Algorithm, vol. 30, Elsevier, New York, NY, USA, 2012.
  16. Is See5/C5.0 Better Than C4.5?2009, http://www.rulequest.com/see5-comparison.html.
  17. Information on See5/C5.0—RuleQuest Research Data Mining Tools, 2011, http://www.rulequest.com/see5-info.html.
  18. X. Zhu, J. Wang, S. Wu, and H. Yan, “Research and application of the improved algorithm C4.5 on decision tree,” in Proceedings of the International Conference on Test and Measurement (ICTM '09), pp. 184–187, IEEE, Hong Kong, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. S. McCanne and S. Floyd, “Network Simulator Version 2,” http://www.isi.edu/nsnam/ns.
  20. Z. Wang, Y. P. Chen, and C. Li, Implementation of the AODV Routing Protocol in ns2 for Multi-Hop Wireless Networks, Memorial University, 2010.