{"title":"Unifying Threats Against Information Integrity in Participatory Crowd Sensing","authors":"Shameek Bhattacharjee, Sajal K. Das","doi":"10.1109/mprv.2023.3296271","DOIUrl":null,"url":null,"abstract":"This article proposes a unified threat landscape for participatory crowd sensing (P-CS) systems. Specifically, it focuses on attacks from organized malicious actors that may use the knowledge of P-CS platform’s operations and exploit algorithmic weaknesses in AI-based methods of event trust, user reputation, decision-making, or recommendation models deployed to preserve information integrity in P-CS. We emphasize on intent driven malicious behaviors by advanced adversaries and how attacks are crafted to achieve those attack impacts. Three directions of the threat model are introduced, such as attack goals, types, and strategies. We expand on how various strategies are linked with different attack types and goals, underscoring formal definition, their relevance, and impact on the P-CS platform.","PeriodicalId":55021,"journal":{"name":"IEEE Pervasive Computing","volume":"1 1","pages":"66-75"},"PeriodicalIF":1.6000,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Pervasive Computing","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/mprv.2023.3296271","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
This article proposes a unified threat landscape for participatory crowd sensing (P-CS) systems. Specifically, it focuses on attacks from organized malicious actors that may use the knowledge of P-CS platform’s operations and exploit algorithmic weaknesses in AI-based methods of event trust, user reputation, decision-making, or recommendation models deployed to preserve information integrity in P-CS. We emphasize on intent driven malicious behaviors by advanced adversaries and how attacks are crafted to achieve those attack impacts. Three directions of the threat model are introduced, such as attack goals, types, and strategies. We expand on how various strategies are linked with different attack types and goals, underscoring formal definition, their relevance, and impact on the P-CS platform.
期刊介绍:
IEEE Pervasive Computing explores the role of computing in the physical world–as characterized by visions such as the Internet of Things and Ubiquitous Computing. Designed for researchers, practitioners, and educators, this publication acts as a catalyst for realizing the ideas described by Mark Weiser in 1988. The essence of this vision is the creation of environments saturated with sensing, computing, and wireless communication that gracefully support the needs of individuals and society. Many key building blocks for this vision are now viable commercial technologies: wearable and handheld computers, wireless networking, location sensing, Internet of Things platforms, and so on. However, the vision continues to present deep challenges for experts in areas such as hardware design, sensor networks, mobile systems, human-computer interaction, industrial design, machine learning, data science, and societal issues including privacy and ethics. Through special issues, the magazine explores applications in areas such as assisted living, automotive systems, cognitive assistance, hardware innovations, ICT4D, manufacturing, retail, smart cities, and sustainability. In addition, the magazine accepts peer-reviewed papers of wide interest under a general call, and also features regular columns on hot topics and interviews with luminaries in the field.