References
- D. Evans, "The Internet of Things: how the next evolution of the internet is changing everything," Cisco Internet Business Solutions Group (IBSG), San Jose, CA, 2011.
- M. Kanellos, "What's The Big Data?," 2016; https://whatsthebigdata.com/2016/03/07/amount-of-data-created-annually-to-reach-180-zettabytes-in-2025/.
- A. Botta, W. De Donato, V. Persico, and A. Pescape, "On the integration of cloud computing and Internet of Things," in Proceedings of 2014 International Conference on Future Internet of Things and Cloud, Barcelona, Spain, 2014, pp. 23-30.
- X. Sheng, J. Tang, X. Xiao, and G. Xue, "Sensing as a service: challenges, solutions and future directions," IEEE Sensors Journal, vol. 13, no. 10, pp. 3733-3741, 2013. https://doi.org/10.1109/JSEN.2013.2262677
- R. K. Ganti, F. Ye, and H. Lei, "Mobile crowdsensing: current state and future challenges," IEEE Communications Magazine, vol. 49, no. 11, pp. 32-39, 2011. https://doi.org/10.1109/MCOM.2011.6069707
- X. Jin and Y. Zhang, "Privacy-preserving crowdsourced spectrum sensing," IEEE/ACM Transactions on Networking (TON), vol. 26, no. 3, pp. 1236-1249, 2018. https://doi.org/10.1109/TNET.2018.2823272
- E. Macias, A. Suarez, and J. Lloret, "Mobile sensing systems," Sensors, vol. 13, no. 12, pp. 17292-17321, 2013. https://doi.org/10.3390/s131217292
- L. G. Jaimes, I. Vergara-Laurens, and M. A. Labrador, "A location-based incentive mechanism for participatory sensing systems with budget constraints," in Proceedings of 2012 IEEE International Conference on Pervasive Computing and Communications, Lugano, Switzerland, 2012, pp. 103-108.
- Y. Wen, J. Shi, Q. Zhang, X. Tian, Z. Huang, H. Yu, Y. Cheng, and X. Shen, "Quality-driven auction-based incentive mechanism for mobile crowd sensing," IEEE Transactions on Vehicular Technology, vol. 64, no. 9, pp. 4203-4214, 2015. https://doi.org/10.1109/TVT.2014.2363842
- V. S. Pulla, C. S. Jammi, P. Tiwari, M. Gjoka, and A. Markopoulou, "QuestCrowd: a location-based question answering system with participation incentives," in Proceedings of 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Turin, Italy, 2013, pp. 75-76.
- Q. Xie and L. Wang, "Privacy-preserving location-based service scheme for mobile sensing data," Sensors, vol. 16, article no. 1993, 2016.
- G. Danezis, S. Lewis, and R. J. Anderson, "How much is location privacy worth?," in Proceedings of the 4th Annual Workshop on the Economics of Information Security (WEIS), Cambridge, MA, 2005.
- A. Singla and A. Krause, "Incentives for privacy tradeoff in community sensing," in Proceedings of the 1st AAAI Conference on Human Computation and Crowdsourcing, Palm Spring, CA, 2013.
- H. Jin, L. Su, B. Ding, K. Nahrstedt, and N. Borisov, "Enabling privacy-preserving incentives for mobile crowd sensing systems," in Proceedings of 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), Nara, Japan, 2016, pp. 344-353.
- J. Sun and H. Ma, "Privacy-preserving verifiable incentive mechanism for online crowdsourcing markets," in Proceedings of 2014 23rd International Conference on Computer Communication and Networks (ICCCN), Shanghai, China, 2014, pp. 1-8.
- S. Gisdakis, T. Giannetsos, and P. Papadimitratos, "Security, privacy, and incentive provision for mobile crowd sensing systems," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 839-853, 2016. https://doi.org/10.1109/JIOT.2016.2560768
- X. Li, M. Miao, H. Liu, J. Ma, and K. C. Li, "An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism," Soft Computing, vol. 21, no. 14, pp. 3907-3917, 2017. https://doi.org/10.1007/s00500-016-2040-2
- X. Niu, M. Li, Q. Chen, Q. Cao, and H. Wang, "EPPI: an e-cent-based privacy-preserving incentive mechanism for participatory sensing systems," in Proceedings of 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), Austin, TX, 2014, pp. 1-8.
- Y. Gong, Y. Cai, Y. Guo, and Y. Fang, "A privacy-preserving scheme for incentive-based demand response in the smart grid," IEEE Transactions on Smart Grid, vol. 7, no. 3, pp. 1304-1313, 2016. https://doi.org/10.1109/TSG.2015.2412091
- K. Potzmader, J. Winter, D. Hein, C. Hanser, P. Teufl, and L. Chen, "Group signatures on mobile devices: practical experiences," in Trust and Trustworthy Computing. Heidelberg: Springer, 2013, pp. 47-64.
- M. Kim, "Incentive mechanism with privacy-preservation on intelligent parking system utilizing mobile crowdsourcing," in Proceedings of 2017 4th International Conference on Computer Applications and Information Processing Technology (CAIPT), Kuta Bali, Indonesia, 2017, pp. 1-4.
- R. Huang, B. Ying, and A. Nayak, "Protecting location privacy in opportunistic mobile social networks," in Proceedings of 2018 IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 2018, pp. 1-8.
- P. Zhao, J. Li, F. Zeng, F. Xiao, C. Wang, and H. Jiang, "ILLIA: enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries," IEEE Internet of Things Journal, vol. 5, no. 2, pp. 1033-1042, 2018. https://doi.org/10.1109/JIOT.2018.2799545
- B. Ying and A. Nayak, "Social location privacy protection method in vehicular social networks," in Proceedings of 2017 IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France, 2017, pp. 1288-1292.
- D. Chaum and E. Van Heyst, "Group signatures," in Advances in Cryptology-EUROSCRIPT'91. Heidelberg: Springer, 1991, pp. 257-265.
- M. E. Andres, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, "Geo-indistinguishability: differential privacy for location-based systems," in Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS'13), Berlin, Germany, 2013, pp. 901-914.
- V. Primault, S. B. Mokhtar, C. Lauradoux, and L. Brunie, "Differentially private location privacy in practice," in Proceedings of the 3rd Workshop on Mobile Security Technologies (MoST), San Jose, CA, 2014.
- L. Chen, D. Page, and N. P. Smart, "On the design and implementation of an efficient DAA scheme," in Smart Card Research and Advanced Applications. Heidelberg: Springer, 2010, pp. 223-237.
- ISO20008-2.2 Group Signature Scheme Evaluation on Mobile Devices, https://github.com/klapm/group-signature-scheme-eval/.
- Amazon EC2 Instance Types, https://aws.amazon.com/ec2/instance-types/?nc1=h_ls.
- Intel IOT Developer Kit, https://software.intel.com/en-us/iot/hardware/devkit.