ABSTRACT
Smart
phones and other trendy mobile wearable devices are rapidly becoming the
dominant sensing, computing and communication devices in peoples’ daily lives.
Mobile crowd sensing is an emerging technology based on the sensing and
networking capabilities of such mobile wearable devices. MCS has shown great
potential in improving peoples’ quality of life, including healthcare and
transportation, and thus has found a wide range of novel applications. However,
user privacy and data trustworthiness are two critical challenges faced by MCS.
In this article, we introduce the architecture of MCS and discuss its unique
characteristics and advantages over traditional wireless sensor networks, which
result in inapplicability of most existing WSN security solutions. Furthermore,
we summarize recent advances in these areas and suggest some future research
directions.
AIM
The
aim of this paper is we introduce the architecture of MCS and discuss its
unique characteristics and advantages over traditional wireless sensor
networks, which result in inapplicability of most existing WSN security
solutions
SCOPE
The
scope of this paper is user privacy and data trustworthiness are two critical
challenges faced by MCS.
EXISTING SYSTEM
MCS
can provide fine grained monitoring of interested parameters without setting up
the sensing infrastructure beforehand. Moreover, with the proliferation of
mobile wearable devices and the ubiquity of wireless broadband connections, MCS
can operate in an environment which is not feasible or economical for WSNs.
Second, since mobile wearable devices have much more resources than sensor
nodes in terms of computing power, memory, and energy, more requirements can be
met by MCS applications. Third, sensing devices in MCS are mobile in nature.
Therefore, they can collect spatio-temporal data in a much easier way than
traditional WSNs. Fourth, the sensing process is more intelligent as
participants can take control of the sensing process. Fifth, sometimes WSNs
have high installation and maintenance cost, and possibly insufficient node
coverage. However, as MCS leverages existing sensing devices and communication
infrastructure, there is virtually no establishment cost.
DISADVANTAGES
- User privacy
- Data trustworthiness
PROPOSED SYSTEM
In
this project, Although a lot of research and development activities on MCS have
taken place, they mainly focus on new applications and the solution of data
collection. There are a number of other issues that need to be addressed. Among
these are user privacy and data trustworthiness. As MCS applications involve
data collection across wide geographical areas, spatial-temporal information is
invariably associated with the data uploaded by participants. This imposes
possible threats to user privacy because the collected data may disclose their
locations and trajectories. Other possible privacy invasions include recording
intimate discussions and capturing private scenes. Such threats would
discourage people from becoming participants in MCS. Since altruistic data
collection is a critical element of MCS, this issue of privacy invasion needs
to be addressed immediately before the success of MCS is explored further.
Another security issue of MCS is the reliability of the uploaded data. As data
are reported by participants, they could possibly be falsified. Hence, this
raises the issue of data trustworthi-ness. Furthermore, this issue inherently
conflicts with the privacy issue. This is because if participants’ identities
are not disclosed, those participants reporting falsified or even fabricated
data cannot be identified and eliminated. In other words, if full anonymity is
provided to MCS participants, guaranteeing the trustworthiness of reported data
is difficult. Hence, data trustworthiness in MCS becomes more crucial than in traditional
wireless sensor networks (WSNs), which deploy a large number of wireless sensor
devices managed by the network owner.
ADVANTAGES
· Protecting
the data trustworthiness counteracts the mechanisms for preserving privacy.
· A
good privacy-preserving reputation system for MCS should consider the link ability
exposed by reputation values
SYSTEM ARCHITECTURE
SYSTEM CONFIGURATION
HARDWARE REQUIREMENTS:-
· Processor - Pentium –III
·
Speed - 1.1 Ghz
·
RAM - 256 MB(min)
·
Hard
Disk - 20 GB
·
Floppy
Drive - 1.44 MB
·
Key
Board - Standard Windows Keyboard
·
Mouse - Two or Three Button Mouse
·
Monitor -
SVGA
SOFTWARE REQUIREMENTS:-
·
Operating
System : Android OS
·
Front
End : JAVA
·
Database
: Sqlite
·
Tool :Eclipse
REFERENCES
Suarez-Tangil,
G.,Tapiador, J.E. ; Lombardi, F. ; Di Pietro, R. “ALTERDROID: Differential
Fault Analysis of Obfuscated Smartphone Malware”, IEEE Transactions on Mobile
Computing Volume PP , Issue 99 June 2015
No comments:
Post a Comment