Yanming Fu , Bocheng Huang , Lin Li , Jiayuan Chen , Wei Wei
{"title":"Privacy-security oriented chaotic compressed sensing data collection in edge-assisted mobile crowd sensing","authors":"Yanming Fu , Bocheng Huang , Lin Li , Jiayuan Chen , Wei Wei","doi":"10.1016/j.adhoc.2024.103507","DOIUrl":null,"url":null,"abstract":"<div><p>As a data-centric network, the Mobile Crowd Sensing (MCS) collects and uploads sensing data through intelligent terminal devices carried by workers. However, due to resource limitations, the confidentiality, integrity and communication cost issues of sensing data have not been well coordinated and resolved in the actual MCS data collection process. In this regard, this paper proposes an edge computing-assisted MCS Chaotic Compressed Sensing Secure Data Collection scheme (CCS-SDC), which supports the secure collection of sensing data and saves communication cost. In CCS-SDC, workers first use the encryption algorithm based on chaos theory to encrypt the collected sensing data, and then adopt the hash location algorithm based on chaos theory to calculate the corresponding hash verification code of the sensing data. After receiving the encrypted sensing data transmitted by the worker, the edge server recomputes the hash verification code of the encrypted sensing data and verifies the integrity of the data, which can locate the changed sensing task data to a certain extent. Then the sensing data is compressed and sampled based on the generated chaos measurement matrix to reduce the amount of data transmission and further enhance the confidentiality of the sensing data. In addition, the same hash positioning algorithm is used between the edge server and the sensing platform to protect data integrity. For the changed data located by integrity verification, in addition to choosing to let workers re-sense and submit, the sensing platform can also choose to discard the changed sensing data under appropriate circumstances, and still reconstruct and decrypt the remaining data through the proposed algorithm to obtain effective original sensing data. The experimental evaluation results on real data sets show that CCS-SDC achieves the best effects, not only achieving lower sensing data communication cost than other related schemes, but also better protecting the confidentiality and integrity of sensing data, which is very useful for resource-constrained MCS data collection scenarios.</p></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870524001185","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
As a data-centric network, the Mobile Crowd Sensing (MCS) collects and uploads sensing data through intelligent terminal devices carried by workers. However, due to resource limitations, the confidentiality, integrity and communication cost issues of sensing data have not been well coordinated and resolved in the actual MCS data collection process. In this regard, this paper proposes an edge computing-assisted MCS Chaotic Compressed Sensing Secure Data Collection scheme (CCS-SDC), which supports the secure collection of sensing data and saves communication cost. In CCS-SDC, workers first use the encryption algorithm based on chaos theory to encrypt the collected sensing data, and then adopt the hash location algorithm based on chaos theory to calculate the corresponding hash verification code of the sensing data. After receiving the encrypted sensing data transmitted by the worker, the edge server recomputes the hash verification code of the encrypted sensing data and verifies the integrity of the data, which can locate the changed sensing task data to a certain extent. Then the sensing data is compressed and sampled based on the generated chaos measurement matrix to reduce the amount of data transmission and further enhance the confidentiality of the sensing data. In addition, the same hash positioning algorithm is used between the edge server and the sensing platform to protect data integrity. For the changed data located by integrity verification, in addition to choosing to let workers re-sense and submit, the sensing platform can also choose to discard the changed sensing data under appropriate circumstances, and still reconstruct and decrypt the remaining data through the proposed algorithm to obtain effective original sensing data. The experimental evaluation results on real data sets show that CCS-SDC achieves the best effects, not only achieving lower sensing data communication cost than other related schemes, but also better protecting the confidentiality and integrity of sensing data, which is very useful for resource-constrained MCS data collection scenarios.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.