Impact of misbehaving devices in mobile crowd sourcing systems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations


With the tremendous advances in ubiquitous computing, and more specifically with mobile phones, mobile crowd sensing (MCS) has become an appealing part of IoT. However, MCS is vulnerable to multiple types of attacks which could be caused by external or internal adversaries. While external attacks, such as spoofing and jamming are addressed using network's security measures, internal attacks such as maliciously degrading the Quality of Service (QoS) of the tasks by intentionally submitting false reports, should be handled by the MCS systems. The current solutions aim to maximize the completion of tasks in selection based on the reputation or the credibility of the workers, but without consideration of internal attacks threat. This paper focuses on internal misbehaving act, similar to Sybil attacks, where users impersonate multiple identities to change the majority-voting result of the task or to selfishly maximize their profit with minimal costs, using multiple devices. These workers take advantage of the anonymity of MCS for privacy protection to pose the attack. This paper studies the need for a resilient approach which detects and eliminates misbehaving devices during workers' selection in MCS.

Original languageBritish English
Title of host publicationProceedings - 2019 IEEE World Congress on Services, SERVICES 2019
EditorsCarl K. Chang, Peter Chen, Michael Goul, Katsunori Oyama, Stephan Reiff-Marganiec, Yanchun Sun, Shangguang Wang, Zhongjie Wang
PublisherInstitute of Electrical and Electronics Engineers Inc.
Number of pages6
ISBN (Electronic)9781728138510
StatePublished - Jul 2019
Event2019 IEEE World Congress on Services, SERVICES 2019 - Milan, Italy
Duration: 8 Jul 201913 Jul 2019

Publication series

NameProceedings - 2019 IEEE World Congress on Services, SERVICES 2019


Conference2019 IEEE World Congress on Services, SERVICES 2019


  • Identity management
  • Internal attacks
  • Mobile crowd sourcing
  • Trust management


Dive into the research topics of 'Impact of misbehaving devices in mobile crowd sourcing systems'. Together they form a unique fingerprint.

Cite this