Next Article in Journal
Combined Use of Sentinel-1 SAR and Landsat Sensors Products for Residual Soil Moisture Retrieval over Agricultural Fields in the Upper Blue Nile Basin, Ethiopia
Next Article in Special Issue
Multi-Objective Evolutionary Design of an Electric Vehicle Chassis
Previous Article in Journal
Compressed-Domain ECG-Based Biometric User Identification Using Compressive Analysis
Previous Article in Special Issue
Robust Semi-Supervised Traffic Sign Recognition via Self-Training and Weakly-Supervised Learning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

SenseCrypt: A Security Framework for Mobile Crowd Sensing Applications

by
Nsikak Pius Owoh
* and
Manmeet Mahinderjit Singh
School of Computer Sciences, Universiti Sains Malaysia, Penang 11800, Malaysia
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(11), 3280; https://doi.org/10.3390/s20113280
Submission received: 30 March 2020 / Revised: 18 May 2020 / Accepted: 25 May 2020 / Published: 9 June 2020
(This article belongs to the Special Issue Data Processing of Intelligent Sensors)

Abstract

:
The proliferation of mobile devices such as smartphones and tablets with embedded sensors and communication features has led to the introduction of a novel sensing paradigm called mobile crowd sensing. Despite its opportunities and advantages over traditional wireless sensor networks, mobile crowd sensing still faces security and privacy issues, among other challenges. Specifically, the security and privacy of sensitive location information of users remain lingering issues, considering the “on” and “off” state of global positioning system sensor in smartphones. To address this problem, this paper proposes “SenseCrypt”, a framework that automatically annotates and signcrypts sensitive location information of mobile crowd sensing users. The framework relies on K-means algorithm and a certificateless aggregate signcryption scheme (CLASC). It incorporates spatial coding as the data compression technique and message query telemetry transport as the messaging protocol. Results presented in this paper show that the proposed framework incurs low computational cost and communication overhead. Also, the framework is robust against privileged insider attack, replay and forgery attacks. Confidentiality, integrity and non-repudiation are security services offered by the proposed framework.

1. Introduction

The Internet of Things (IoT) is a dynamic and global network infrastructure for linking together the physical and virtual world, using standard and interoperable communication protocols [1]. The IoT uses well-known technologies such as wireless sensor networks (WSNs) and radio frequency identification (RFID). A recent IoT trend is mobile crowd sensing, where carriers (known as a “crowd”) of sensing and computing devices such as smartphones, tablets and wearable devices acquire and share essential data for various applications [2]. Mobile Crowd Sensing (MCS) has revolutionized the IoT to become a vital sensing mechanism. The advancement in mobile technology has been key to the advantages of MCS over traditional sensing technologies (such as WSNs). Firstly, the availability of affordable smartphones with integrated sensors has enabled the development of several landmark applications. Furthermore, the programmability of smartphones supports novel sensing applications such as the sharing of user’s real-time activity with friends on social networks. Secondly, apart from sensing, mobile devices like smartphones have computing and communication features which allow programmers to deploy third-party applications. Thirdly, the availability of application stores by phone vendors allow sensing application developers to ship out novel applications at large-scale. Such large-scale sensing was not possible with previous sensing technologies like wireless sensing networks (WSNs). Fourthly, developers can offload mobile services to backend servers, thereby ensuring additional computing resources that aid advanced features in sensing applications [3]. An example of such sensing applications is feedback and persuasion apps. Sensing applications can be broadly classified into people-centric and environment-centric sensing. People-centric sensing focuses on collecting human-related data at different scales to record users’ activities (e.g., daily routines), health records and analyze behaviours (e.g., gait) [4]. Personal, group and community sensing are categories of this sensing type. Environment-centric sensing, on the other hand, collects data about the environment (e.g., noise and air pollution) [5]. Smartphone sensors such as accelerometers, gyroscopes, magnetometers and GPS recievers aid the development of novel applications across several domains such as transportation [6], healthcare [7], social networks [8], safety [9], and environmental monitoring [10], thereby expanding the applicability of mobile crowd sensing. Despite its benefits, MCS still faces challenges that include security and privacy [11,12,13]; quality and reliability of sensed data [14]; incentivization of participants [15]. Other issues in MCS are energy consumption of mobile sensing devices [16]; and sensor data annotation [17,18,19,20,21].
Security and privacy are pressing issues in MCS, raising concerns about the collection and usage of personal data. In MCS, sensitive information of users such as their identity and location information are vulnerable to privacy attacks [22]. An adversary can intercept MCS traffic and capture the sensitive information of users contained in sensor data. For example, GPS sensor readings can be used by an adversary to obtain personal information about MCS participants, such as their daily routes to work and their home location. With knowledge of the possible vulnerability of their sensitive data, MCS users are mostly reluctant to participate in sensing tasks.
Some frameworks have been proposed to address security and privacy issues in MCS. These frameworks include PRISM, proposed by Das [23]; AnonySense, proposed by Shin [24] and PEPSI, proposed by De Cristofaro and Soriente [25]. These frameworks, however, overlook the security of sensitive location information of participants. To tackle this issue, Liu [26] proposed a security framework called Invisible Hand, which uses economic models to secure location information of MCS users. Nevertheless, the proposed framework, while protecting location information of users does not consider the peculiarity of GPS signals, considering the “on” and “off” state of GPS sensors in mobile devices. The lack of an appropriate automatic annotation mechanism for sensitive location data at the sensing layer of MCS undermines the effective security of such data.
Encryption and digital signature schemes are significant cryptographic primitives used in many applications. Signcryption ensures signing and encryption in one logical step. It incurs low computational cost and communication overhead compared to the sign-then-encrypt technique. Signcryption guarantees confidentiality, integrity, authenticity and non-repudiation. Nevertheless, drawbacks with signcryption include, transfer of a large amount of information and its verification complexity. A remedy to these drawbacks is the aggregate signcryption scheme, which aggregates signcrypted messages, hence reducing the amount of transferred information between communicating entities. This approach minimizes the computational complexity and communication overheads associated with signcryption schemes. Application areas of aggregate signcryption include online banking, online polling, and traffic management. Specifically, certificateless aggregate signcryption (CLASC) have been employed in e-auction [27] and vehicular crowdsensing [28]. However, computational complexity and communication overheads still exist with CLASC schemes due to the implementation approach used.
In this paper, we show that a novel implementation approach involving spatial coding compression and the integration of MQTT can enhance the CLASC scheme proposed by Basudan, Lin [28] in terms of computation and communication overheads. To this end, this paper proposes a framework called “SenseCrypt”, that automatically labels sensor data either as non-sensitive or sensitive data. The framework also signcrypts data labelled as sensitive data. The framework, which is an extension of our previous work in [21], employs K-means algorithm for the annotation of sensitive location information and a certificateless aggregate signcryption scheme for data security.
The contributions of this paper are threefold:
  • To propose an annotation model that labels sensor data into non-sensitive (does not contain location readings) or sensitive (contains location readings) clusters.
  • To secure sensitive location data in MCS using an efficient CLASC scheme that incurs low computational cost and communication overheads.
  • To evaluate the performance of the proposed framework against known attacks in mobile crowd sensing.
The rest of this paper is structured as follows: Section 2 presents a review of related works on some security and privacy techniques and frameworks in MCS. In Section 3, we present our proposed SenseCrypt framework that incorporates data annotation and sensitive data signcryption. Furthermore, the dataset used to develop the models in the framework are also discussed in this section. The results from the evaluation of the framework are shown and discussed in Section 4. The section also presents the performance and security analysis of the proposed framework. Section 5 concludes the paper and highlights our future work.

2. Literature Review

Anonymity-based approaches and cryptographic methods are commonly used to ensure security and privacy in mobile crowd sensing [29]. Existing security and privacy solutions that employ these techniques are presented in this section.

2.1. Anonymity-Based Techniques in MCS

Anonymity-based methods presented in this subsection include K-anonymity, cloaking, pseudonymity, and differential privacy.

2.1.1. K-Anonymity

K-anonymity in MCS is an anonymisation technique that removes unique details in the information of K participants by adding similar information from other participants [30]. Consequently, K-anonymity is ensured in the generated information if the data for each participant cannot be identified from at least K-1 other participants [31]. This privacy approach is implemented in Privacy-Preserving Reputation System (PPRS), which was proposed by Huang [32]. The system comprises of participants, a trusted third party and an application server as entities. The system employs K-anonymity on participant’s location and time data by normalising them with similar data of other participants. The trusted third party in the framework ensures the security and privacy of participants’ data and guarantees data trustworthiness. However, K-anonymity is still vulnerable to homogeneity attacks. These attacks exploit the monotony of certain features to identify users from the set of k participant [4].

2.1.2. Cloaking

Cloaking is a technique that replaces actual data with their corresponding anonymised versions to avoid unique identification of the real data [32]. A common cloaking technique is spatial cloaking. In spatial cloaking approaches, sensitive information is blurred in a cloaked zone, thereby maintaining users’ privacy. Spatial cloaking employs generalisation, transformations, or fake locations to hide the actual location of participants. A spatial cloaking technique is used by Ghinita [33]. The authors segment spaces into a set of regions, then employ a specific probability distribution to select participants in each region to broadcast their precise location. Also, Kazemi and Shahabi [34] employ a peer-to-peer spatial cloaking technique to cloak users’ location when querying MCS servers. Nonetheless, major issues with this technique are that a single point of failure is possible. Secondly, to enforce cloaking, users must continuously forward their locations to the anonymiser, which introduces bottlenecks and delays.

2.1.3. Pseudonymization

Pseudonyms are used to preserve the anonymity of MCS participants by substituting their identities with aliases. In [35], the authors proposed a scheme that uses multiple pseudonyms for individual users and reputation values are sent between various pseudonyms owned by the same user. A trusted server is integrated into the scheme to coordinate the transfer of reputation scores between several pseudonyms. Ma [36] proposed a pseudonym-based anonymous identity authentication mechanism for MCS. It uses pseudonym construction rules to encrypt the real names of MCS users. The security mechanism is a hybridisation of public key infrastructure (PKI) and combined public key (CPK) technology to address the large-scale key management issue. The identity authentication mechanism proposed by the authors consists of an application server, a certificate authority database, and a key management centre (KMC). The key management centre employs elliptic curve cryptography (ECC), which sets an m × h order to the secretive seed key (SSK) of integer vector ( r i j ) . It then computes a public key vector ( r i j G ) = ( x i j , y i j ) to obtain a public seed key (PSK) matrix. G in the scheme is the base point of the elliptic curve, while x and y are the public key parameters. The security scheme then publishes PSK, while keeping SSK private. However, pseudonyms must be complemented by other security mechanisms to effectively secure location information of participants, which makes it a non-trivial approach [4].

2.1.4. Differential Privacy

A general issue with cloaking techniques is its ineffectiveness when an attacker has prior knowledge of the user’s location distribution [37]. Differential privacy [38] is employed in the location privacy-preserving framework proposed by Wang [39] as a solution to the abovementioned problem. The framework integrates location obfuscation and data adjustment to achieve secure privacy. Real-life traffic monitoring and temperature datasets were used to evaluate the proposed scheme. Results show that the proposed scheme evenly distributes obfuscation and improves the inference accuracy of the obfuscated data. Furthermore, Wang [40] employed differential privacy into task allocation to ensure the security of location privacy irrespective of adversaries’ prior knowledge of the data. With the scheme, participants can obfuscate their reported locations without the aid of any third-party. A summary of some proposed security schemes that adopt the anonymity approach is presented in Table 1.
Anonymity-based techniques are trivial and implementable in MCS. Nevertheless, users’ information can still be linked to their identities, resulting in the de-anonymisation of users [32]. In works proposed by Liu [26] and Zhang [41], the authors showed that malicious entities can infer important information of participants even when participants anonymously sense and process data. With this, even anonymised participants are still vulnerable to location-based inference attacks and tracing attacks [42].

2.2. Cryptographic-Based Techniques in MCS

Cryptography is another approach that can be used to achieve security and privacy in MCS by encrypting sensed data at the sender’s side, then transmitting the encrypted data to the application server [30]. Cryptographic techniques ensure that sensitive information of participants remains undisclosed to unauthorised parties. It is a technique that maintains data confidentiality, integrity, authentication and non-repudiation. Cryptographic primitives guarantee security without adding noise to sensor data, thus maintaining its original quality [42]. Some of these primitives are presented below.

2.2.1. Homomorphic Encryption

Several studies have proposed homomorphic encryption as an effective technique in securing sensitive data in MCS. A cloud-enabled privacy-preserving truth discovery (PPTD) framework was proposed by Miao [42]. The PPTD framework ensures effective privacy and high accuracy. The framework employs homomorphic encryption to transmit encrypted sensor readings to the cloud server. After that, users’ encrypted weights are updated by the cloud server without decrypting them, then sends the results to each user. However, the proposed scheme is non-trivial as it incurs significant computation and communication overhead due to the use of fully homomorphic encryption. To improve on their earlier proposed PPTD framework, [43] proposed a novel lightweight privacy-preserving truth discovery framework. The framework employs additive homomorphic encryption to secure sensor data of participants in MCS. Encryption is not directly applied on data, somewhat random numbers are used instead, and the encrypted data is moved to the cloud. A data requester and participating workers are the two components in the proposed framework. A secure system in mobile crowd sensing that utilises both additive homomorphic encryption with garbled circuits was presented by Zheng [44]. Garbled circuits are used to construct the encryption protocol by enabling S 0 holding E p k 1 ( a ) and E p k 1 ( b ) to get E p k 1 ( a / b ) , without disclosing a , b (where a and b are fractional integers). In this case, pk 1 is the public key of S 1 . The goal is for S 1 to generate a garbled circuit for the secure division, while S 0 evaluates the garbled circuit and finally gets the division result in the encrypted form using E p k 1 ( a ) and E p k 1 ( b ) as inputs. S 0 and S 1 are the sensors in the proposed scheme. Homomorphic encryption schemes offer confidentiality, integrity and privacy as security services, but authentication and non-repudiation are not provided. Also, the technique is computational expensive to implement on MCS devices.

2.2.2. Certificateless Aggregate Signcryption

Certificateless public key cryptography (CLPKC) is an intermediate between the traditional public key cryptography (PKC) and ID-based cryptography (ID-PKC) [45]. On the one hand, a certificate authority is required in traditional PKC to generate and manage keys of users, which introduces the certificate management problem. On the other hand, in ID-PKC, the generation of private keys of users based on their identities is done by a trusted key generator. This approach, however, leads to the key escrow problem. CLPKC offers a solution to the mentioned problems. Though CLPKC requires a key generation centre (KGC) for the generation of partial private keys of users, the final private keys are chosen by the users and cannot be accessed by the KGC. The final private keys of users are obtained from the combination of the partial keys generated by the KGC and the secret information selected by the users [27]. Also, the KGC computes the public key of the users using its public parameters with other information, which are secretly kept and published by the user.
Signcryption [46] is a cryptographic primitive that incurs lower computational cost and communication overhead than the sign-then-encrypt technique. In 2008, Barbosa and Farshim [47] proposed the first certificateless signcryption (CLASC) scheme. However, Selvi [48]} proved that Barbosa’s scheme was forgeable. A different CLSC scheme proposed by Liu [49] was shown to be insecure by Weng [50] and Miao [51].
Aggregate signcryption was first conceptualised by Selvi [48], and the authors defined an adequate security model for identity-based aggregate signcryption schemes. They also proposed examples that seem secure in the random oracle model. A security model for certificateless aggregate signcryption schemes (CLASC) was proposed by Eslami and Pakniat [27]. The scheme was proven to be secure in the random oracle model under the gap Bilinear Diffie-Hellman and Computational Diffie-Hellman Intractability assumptions. Basudan [28] proposed another CLASC scheme which enhanced the pairings required by aggregate signature verifications and unsigncryption. The authors used the scheme to develop a privacy-preserving protocol for the improvement of security in data transmission of vehicular crowd sensing. The secure data is used in road surface condition monitoring. The authors showed that their proposed scheme ensures confidentiality, integrity, mutual authentication, privacy and anonymity. However, their scheme still requires implementation enhancement for optimal performance when adopted in generic frameworks. Some proposed cryptographic-based schemes and techniques in MCS and the IoT are summarized in Table 2.
This paper addresses the problems above by presenting a security framework that signcrypts sensitive location information of MCS users using an efficient CLASC scheme. Hence, ensuring data confidentiality, integrity, authentication and non-repudiation.

3. Methods

In this section, first, we present the architecture of the proposed framework and discuss the interaction between the different modules. We then divulge the implementation process of the framework.

3.1. Architecture of the Proposed Framework

The proposed framework is an enhancement of the typical MCS architecture proposed by Christin [4]. Figure 1 illustrates our system architecture. At the core, our framework consists of two entities: the data annotation and data signcryption modules, which are implemented as a client-server model. The SenseCrypt framework interacts seamlessly with existing MCS stakeholders: sensing administrators, the participants and the end-users:
  • Sensing administrators: they are members of an organization (profit/nonprofit), research groups, individuals who initiate sensing tasks. They design, implement, deploy, manage and maintain MCS applications (using MCS application servers). They set up the application server to acquire, store, and process raw sensor data from participants.
  • Participants: download and install sensing applications on their smartphones and participate in sensing tasks. They collect people-centric or environment-centric data during sensing activities. At a personal scale, these participants may capture data to improve their health conditions or track their sport experiences. Meanwhile, at a community scale, they may upload data to help other users by reporting road and/or traffic conditions. Most times, this information contains sensitive data of participants. Such information requires adequate security against attacks and unauthorized access.
  • End-users: access the data collected by participants based on their needs and preferences. Sensing administrators, participants and other users are all regarded as end-users. End-users visualize processed data by querying MCS application servers which are run by the sensing administrators.
The data annotation module consists of smartphones with integrated accelerometer, gyroscope, magnetometer and GPS sensors as presented in Figure 1. During sensing activities, unlabelled data from these sensors are automatically labelled either as non-sensitive or sensitive data by the framework. This process is achieved using the K-means algorithm. All sensor data labelled as sensitive (raw sensor data containing location readings) are compressed then signcrypted using the spatial coding scheme and certificateless aggregate signcryption scheme, respectively. The signcrypted sensitive data is forwarded to the aggregators for aggregation. On the other hand, the MQTT broker handles all published “topics” in the framework and manages communication between publishers and subscribers. Meanwhile, the MCS server is a multi-threaded server system. New threads are used for incoming connections from MCS participants (referred to as mobile clients in later sections of this paper).
Figure 2 presents the implementation processes of the framework. The process starts with data collection (publicly available dataset) and ends with data decompression. Data signcryption starts after sensitive data have been labelled and validated. It is worthy of note that the data of interest in the framework is contained in the sensitive data cluster denoted as ASD (annotated sensitive data). The ASD is then compressed into ASD*. The compressed annotated sensitive data ASD* is then signcrypted to obtain SCSD (signcrypted sensitive data) and forwarded to the aggregators. After aggregation, SCSDagr is generated and sent to subscribed topics running on the MQTT broker. The MCS application server receives and unsigncrypts SCSDagr to obtain the compressed annotated sensitive data (ASD*). As a final step, the ASD* is decompressed to get the annotated sensitive data ASD.

3.2. Sensor Data Annotation

Processes in the sensor data annotation module include data collection (dataset), pre-processing and data clustering.

3.2.1. Dataset

The dataset presented by Freedman [52] was used for the evaluation of the proposed framework. The real-world dataset is a collection of unlabelled motion and location readings of twenty participants acquired over six months. There are 3112 instances and 36 attributes in the dataset. After feature selection and extraction, 11 relevant attributes were obtained including accelerometer (Ax, Ay, Az), gyroscope (Gx, Gy, Gz), magnetometer (Mx, My, Mz) and GPS (latitude, longitude). Table 3 presents the extracted features and their description. The availability/unavailability of GPS data in terms of outdoor and indoor movements of users captured in the dataset makes it appropriate for the framework. Since the first task of the framework is to model the fluctuations of GPS sensor and automatically label any sensor reading containing location data as sensitive, otherwise non-sensitive, dataset presented by Freedman [52] meets this purpose.
Furthermore, data normalization was performed as a pre-processing process since the data range of some features in the dataset is enormous, and such dimensions determine the variance of the distance. The Min-Max normalisation method was used to ensure that all the data values come under the range of (0,1).

3.2.2. K-Means Clustering

The K-means algorithm is an unsupervised learning algorithm commonly used in tackling clustering problems in sensor networks due to its simple implementation and linear-complexity [53]. It separates data into different groups (referred to as clusters). With K-means clustering, cluster centres ( C ) are stochastically initialized to K from points in a given data to ensure uniqueness of all centroids (i.e.,   c e n t r o i d s   C i   a n d   C j ,   C i C j ). For the K-means to function, three parameters must be provided by the user, which are: number of clusters K , cluster initialisation and the distance metric [54]. The K-means algorithm can be formally represented as follows:
Let D = { d 1 , , d n } be the data (sensor data), μ q = d ϵ C q ( d | n q ) be the centroid of the cluster C q and let K be the cluster number ( 1 q K ) . Then the objective function of the K-means clustering algorithm is the sum of squared error (SSE) as follows:
S k = q = 1 K d ϵ C q   d μ q 2
where μ q is the mean of the cluster C q containing data points { d 1 , , d n } and d is a high dimension set of observations. The aim here is to minimize the objective function for a fixed number of clusters. The K-means algorithm used to run the pre-processed dataset, distinctly grouped sensor data into groups. The clustering model from the K-means algorithm, which was implemented in Python runs on the smartphone. The model was used to annotate sensor data within the dataset into non-sensitive and sensitive clusters. This process is performed on the client-side (smartphone) before the compression and encryption of location data (data in the sensitive cluster).

3.3. Sensitive Data Signcryption

The data signcryption module of the proposed SenseCrypt framework employs the certificateless aggregate signcryption scheme. This subsection presents the CLASC scheme and its implementation in the system model.

3.3.1. Preliminaries of the Certificateless Aggregate Signcryption (CLASC)

This subsection first provides an overview of the bilinear pairing definition, which is adopted in the CLASC scheme for the proposed SenseCrypt framework.
Bilinear Maps: Let G 1 be an additive group of large prime order q , and G 2 be a multiplicative group of similar large prime order. Then let G 1 be generated by P . With this, an admissible bilinear pairing e ˜ : G 1 × G 1 G 2 is a map that has the following properties:
  • Bilinearity: For all P , Q G 1 and a , b Z q * , then e ˜ ( a P , b Q ) = e ˜ ( P , Q ) a b
  • Computability: An algorithm that computes e ˜ ( P , Q ) for P , Q G 1 is efficient. e ˜ : G 1 × G 1 G 2 , which is an admissible bilinear pairing can be run using the modified Weil/Tate pairing over elliptic curves [55].
  • Nondegeneracy: e : ˜ ( P , Q ) 1 G 2 where the identity element of a group G 1 is represented with 1 G 2 .
Definition of bilinear Parameter Generator: A bilinear parameter generator Gen is a probabilistic algorithm that accepts input k as a security parameter and generates as outputs a 5-tuple ( G 1 , G 2 , e ˜ , P , q ) , where G 1 . G 2 are two groups with order q , e ˜ is a non-degenerated and trivial bilinear map, P G 1 is a generator and q is a k-bit prime number.
The components of CLASC are defined based on initial theories proposed by Lu and Xie [56] and Eslami and Pakniat [27]. These components are: a Key Generator Centre (KGC), an aggregating set of I D i of n users with identity of { I D i } i = 1 n ; recipient(s) represented with the identity I D R with an aggregate signcryption generator. Therefore, the following seven probabilistic polynomial time algorithms [28] defines the CLASC scheme of the SenseCrypt framework:
  • Setup: An algorithm that accepts k input as a security parameter, outputs SysParams as system parameters and a master key s , an associated master public key Y p u b . The KCG then implements the algorithm and publishes SysParams and securely stores the key.
  • Partial-Private-Key-Extract: Given the system parameters SysParams, s and identity I D i of an identity i . A partial private key F p a r t is generated by the algorithm and forwarded by the KGC to the legitimate user i .
  • User-Key-Generate: Each user implements this algorithm and accepts inputs SysParams and I D i (user’s identity). The output from this algorithm is a randomly selected secret value g i with an associated public key X i . The public key is generated and published by the user.
  • Signcrypt: Each user I D i which is a member of the aggregated set of n users { I D i } i = 1 n runs this algorithm. Δ is accepted as the state information together with SysParams. All the users must employ similar but distinct state information in the signcryption algorithm. A message m i , user’s identity I D i must be used by all users with the associated public key X i and a private key pair ( g i , F p a r t ) , I D R (receiver’s identity) and with the associated public key X R . With this, the ciphertext C i is generated.
  • Aggregate: The aggregate signcryption generator runs this algorithm and accepts the following inputs: an aggregating set of I D i of n users’ { I D i } i = 1 n , Δ (state information), each sender’s identity I D i with the associated public key X i and C i (cipher generated from the message m i ) . Next, the state information Δ , with the associated public key X R and the receiver’s identity I D R are applied to the message to generate a cipher. The output is an aggregated ciphertext C on messages { m i } i = 1 n .
  • Aggregate-verify: The receiver I D R runs this algorithm by accepting as input an aggregating set of n users { I D i } i = 1 n , the sender’s user identity I D i state information Δ , an aggregated ciphertext C and the associated public key X i . The algorithm only returns true if the aggregate signcryption is legitimate, else it returns false.
  • Aggregate-Unsigncrypt: This algorithm is run by I D R (the receiver) and accepts as input an aggregated ciphertext C , the receiver’s entire private key ( g R , F p a r t ( R ) ) , receiver’s identity I D q , the senders’ identities { I D i } i = 1 n , public key X R with their corresponding public keys { X i } i = 1 n and the state information Δ . The algorithm then returns a set of n plaintexts { m i } i = 1 n .

3.3.2. The CLASC Scheme

This subsection presents the CLASC scheme of the SenseCrypt framework. Table 4 shows the mathematical notations used in the CLASC scheme.

3.3.3. System Model

We present an efficient implementation approach for the CLASC scheme proposed by Basudan [28]. The scheme is designed to ensure the signing and encryption of annotated sensitive data (ASD) in one logical step. The components of the model are shown in Figure 3. The key generator centre (KGC) is a trusted third party entity that only generates a partial private key for mobile clients ( M C ), aggregators (AG) and the MCS application server ( A S ) but does not have access to their final private keys, hence, cannot access sensor data transmitted between them. Implementing this eliminates the key escrow problem and ensures that sensitive location information of MCS users remains private.
On the other hand, ( M C ) are users that employ smartphones to collect sensor data which contain their sensitive location information. Data compression is performed on annotated sensitive data (ASD) before signing and encryption. After signing and encryption of the ASD, the signed ciphertext is forwarded to the aggregator (AG) using their respective partial private keys. The (AG) aggregates signed ciphertexts then forwards the aggregated ciphertexts to the MQTT broker as subscribed “topics”. The MCS application server ( A S ) receives the aggregated ciphertexts from the MQTT broker via its published topics.
The ( A S ) then verifies, unsigncrypts the aggregated ciphertexts using his associated private key. The CLASC scheme implemented in the SenseCrypt framework comprises of the following steps: (i) system setup; (ii) data compression; (iii) annotated sensitive data signcryption; (iv) signcrypted sensitive data aggregation; (v) efficient data transfer; (vi) receive signcrypted sensitive data.

System Setup

First, the key generator centre (KGC) registers both the mobile client (MC), the aggregator (AG) and the MCS application server (AS). Then generates partial private keys F p a r t ; F p a r t ( R ) and public keys key X i ; X R for M C i ,   A G j and A S R , respectively. Next, the KGC generates the bilinear parameters ( G 1 , G 2 , e ˜ , P , q ) , given the security parameter k , and performs this by executing Gen(k). Then, the KGC chooses at random s Z q * as its master secret key and computes the master public key Y p u b = s Y . Furthermore, four secure hash functions are selected by the CU: H 1 : { 0 , 1 } * Z q * , H 2 : { 0 , 1 } * { 0 , 1 } where is the bit-length of plaintexts, H 3 : { 0 , 1 } * G 1 and H 4 : Z q * G 1 [28]. At this point, the system parameters SysParams, ( G 1 , G 2 , e ˜ , P , q , Y p u b , H 1 , H 2 , H 3 , H 4 ) are available to the registered users M C i , A G j   a n d A S R . The entire setup process for M C i A G j and A S R is shown as follows:
  • A mobile client M C i can arbitrarily select g i Z q * as its secret value, then computes its partial public key M C i ( a ) = g i P .
  • To preserve privacy, M C i can pseudonymize its identity by randomly selecting Q i .
  • M C i forwards its identity and partial public key ( M C i , M C i ( a ) ) to the KGC for registration.
  • The KGC arbitrarily chooses g i Z q * and computes a different partial public key for MC: M C i ( b ) = g i P .
  • KGC calculates the partial private key F p a r t i = g i + s Q i , where Q i = H 1 ( M C i ) , this registers M C i with the partial public key M C i ( a ) .
  • F p a r t i is transmitted securely to M C i . In the public key database, the entire public key ( M C i ( a ) ,   M C i ( b ) ) is stored by the KGC.
  • M C i gets the partial private key F p a r t i and adds it with its secret value g i to generate its entire private key ( g i , F p a r t i ) .
  • M C i checks the correctness of the partial private key g i P = M C i ( b ) + Y p u b H 1 ( M C i ) .

Data Compression

Annotated sensitive data (ASD) to be signcrypted are first compressed by the sender using the spatial coding scheme [57]. Compressing the ASD minimizes the number of messages to be signcrypted. After annotation of sensitive location data, the mobile client (MC) compresses the ASD in such a way that loss of data precision is minimized. Therefore, computation overhead which is mostly experienced with signcryption of sensor data from sensing devices, is reduced. Using spatial compression, a ratio γ , 0 γ < 1 is defined as the sensor data reduction in size, which is relative to the initial uncompressed sensitive data from each mobile client. Spatial coding [57] is an efficient and effective compression technique on continuous reading, such as those acquired by smartphones. It also defines accurately the alphabets of sensor readings, which minimizes data loss during compression. These features of spatial coding justify why it has been adopted for the compression of ASD in the framework. Mathematically, spatial coding can be represented as follows:
γ = 1 compressed   size uncompressed   size
Each mobile client (MC) compresses ASD based on their spatial correlation. The spatial compression involves two steps: the client compression (executed on the smartphone by the participant), and the decompression (at the MCS application server).

Annotated Sensitive Data (ASD) Signcryption

This process is carried out by the mobile client M C i with the pseudonym Q i . The framework identifies annotated sensitive data, compressed using spatial coding as (ASD*). The certificateless signcryption algorithm is then applied on the ASD* to obtain the signcrypted sensitive data (SCSDi) using the following steps:
  • M C i randomly chooses r Z q * and generates T i = r P ,
  • Computes Z b = r P W r b ,
  • Computes Z a = r ( P W r a + Y p u b Q i ) ,
  • Computes h a = H 2 ( I D R | | P k r a | | P W r b | | Γ | | T i | | Z b | | Z a ) ,
  • Computes W i = h a A S D * i and computes h b = H 3 ( I D R | | K r a | | K r b | Γ | | T i | | W i | Q i .
    | | M C i ( b ) | | M C i ( a )
  • Computes h c = H 4 ( Γ ) ,
  • Computes β i = F p a r t i h c + r h b + g i h c .
The ciphertext C i = ( T i , W i , β i ) is appended to sensor data in the form of a signcrypted sensitive Data, which is: S C S D i = ( Q i , S i g n c r y p t ( S e n s i t i v e D a t a i ) ) . The ciphertext C i = S i g n c r y p t ( S e n s i t i v e D a t a ) ( T i , W i , β i ) is forwarded to the aggregate server (AG).

Signcrypted Sensitive Data (SCSD) Aggregation

On successful signcryption of annotated sensitive data, the M C i forwards the ciphertext S C S D i to the aggregators (also called aggregate servers). The aggregate servers are distributed systems with high computational capabilities. These servers aggregate all the ciphertexts from multiple mobile clients. The property provided by the proposed framework allows for numerous aggregations of { S C S D i } i n , which further reduces the computational cost [28]. The distributed aggregate servers perform { S C S D i } i n aggregation and { S C S D i } i n batch verification operations each time an S C S D i is received as shown below:
A. 
SCSD Aggregation
Aggregate SCSD is employed to aggregate several { S C S D i } i n into a single SCSD, that is, { S C S D i } i = 1 n . For sensitive data S e n s i t i v e D a t a i , given { S C S D i } i n , S C S D i = ( Q i ,   S i g n c r y p t ( D a t a i ) ) by mobile clients M C 1 , , M C n , it is possible to get S C S D a g r ( Q i , Q n , S i g n c r y p t ( S e n s i t i v e D a t a i ) 1 i S i g n c r y p t ( D a t a ) i n ) . An aggregate signcryption generator returns the algorithm below:
  • The algorithm collects single ciphertext C i = ( T i , W i , β i ) i = 1 n generated by { M C i } i n with the pseudonym ( Q i ) i = 1 n to a receiver I D R with similar state information Δ .
  • Aggregates several signatures by computing s i g n a g r i = 1 n β i .
  • Outputs aggregated ciphertexts S C S D a g r = ( ( Q i ) i = 1 n , T 1 T n , W 1 W n , S i g a g r ) .
B. 
SCSD Batch Verification
In this step, all the ciphertexts from { M C i } i n users are verified concurrently using the batch verification algorithm. Based on the signature aggregation s i g a g r , the sensor datasets { S C S D i } i = 1 n and the associated public keys ( M C i ( b ) , M C i ( a ) ) j = 1 n for all the M C i and the receiver’s identity I D R and its corresponding public key ( X k r a , X W r b ) using similar state information Δ . The batch verification algorithm verifies the signature through the following process:
  • h b = H 3 ( I D R | | Y r a | | Y r b | | Δ | | T i | | Q i | | M C i ( b ) | | M C i ( a ) ) , for i = 1 , , n
  • h c = H 4 ( Δ ) ,
The signature aggregation S i g a g r is accepted if:
e ˜ ( s i g a g r , P ) = e ˜ ( i = 1 n ( M C i ( b ) + Y p u b Q i , h c ) ) = e ˜ ( i = 1 n T i , h b ) e ˜ ( i = 1 n M C i ( a ) , h c )
If the batch verification process is true, then the aggregator accepts the SCSDs. In this case, the S C S D a g r will be sent to the unsigncryption step. The S C S D a g r is forwarded to the MQTT broker as subscribed topics that are published by the ( A S R ). The efficient transfer process of the S C S D a g r is discussed next.
Since the MCS server does not offer acknowledgement, and participants do no retransmission of sensor data, communication overhead is reduced to its minimum. It so happens because data is only sent once when using level 0 QoS, which is adopted in the proposed framework. MQTT uses a password and a username to secure the connection between devices, which makes it less robust to attacks. More so, all MQTT communication is transmitted in plaintext. As stated in SHODAN [58], a lot of IoT devices that use MQTT transfer data to each other without employing an encryption protocol. Hence, data are unprotected during transfer. On the other hand, to employ an encryption protocol with MQTT, the encryption protocol requires independent implementation under MQTT [59]. As such, the proposed framework transmits only signcrypted data from participants to the MCS servers, hence, ensuring the security of sensitive data.

Efficient Data Transfer Using MQTT Protocol

In the SenseCrypt framework, the transfer of the aggregated sensitive data ( S C S D a g r ) from aggregators to the MCS application server ( A S R ) is implemented using the MQTT protocol. MQTT, which is based on the publish/subscribe model, incurs less communication overhead and ensures scalability [60]. These properties of the MQTT protocol are leveraged in the SenseCrypt framework. The framework runs a topic-based system, where messages (sensing tasks) are published to topics by the MCS application server. Mobile clients and aggregators subscribe to these topics, as shown in Figure 4. However, in the framework only aggregated signcrypted sensitive data S C S D a g r are forwarded to the MQTT broker by the aggregators. The mobile clients subscribe to sensing tasks but forward ciphertexts { S C S D i } i n to the aggregator for aggregation and verification. The MQTT broker handles the addition and removal of aggregators and mobile clients (subscribers) from the system and well as performing filtering of forwarded messages ( S C S D a g r ).
Since the MCS server does not offer acknowledgement, and aggregators do not retransmit S C S D a g r , communication overhead is reduced to its minimum. It so happens because data is only sent once when using level 0 QoS (Quality of Service), which is used in the proposed framework. MQTT uses a password and a username to secure the connection between devices, which makes it less robust to attacks. More so, all MQTT communication is transmitted in plaintext. As stated in SHODAN [58], a lot of IoT devices that use MQTT transfer data to each other without employing an encryption protocol. Hence, data are unprotected during transfer. On the other hand, to employ an encryption protocol with MQTT, the encryption protocol requires independent implementation under MQTT [59]. As such, in the proposed framework, aggregators forward signcrypted data S C S D a g r from mobile clients to the broker, hence, ensuring the security of sensitive location data of users.

Receive Signcrypted Sensitive Data (SCSD)

When the MCS application server receives a message S C S D a g r , from aggregators via the MQTT broker, it first runs the aggregate-verify algorithm. If the algorithm outputs true, then it implements the next step, which is the aggregate-unsigncrypt. If false, then the S C S D a g r , is discarded. This process ensures that MCS application servers process only valid signcrypted sensor data from mobile clients that have been aggregated by the aggregators. The S C S D i (Signcrypted Sensitive Data) is decrypted using the following steps:
  • Z ¯ b = s r T i , Z ¯ a = F p a r t T i
  • h ¯ a = H 2 ( A S R | | P k r a | | P W r b | | Γ | | T i Z ¯ b | | Z ¯ a ) .
  • S e n s i t i v e D a t a i = W i h ¯ a .
On completion of the decryption process, decompression is initiated. The decompression is carried out by the MCS server. Notably, the MCS server decompresses compressed sensitive data after the unsigncrypt process. Recall that a mobile client ( M C i ) compressed annotated data into an array D which was a k × k matrix M = ( a i , j ) k × k , such that, each element a i , j stores the value i , j , as discussed earlier in the compression phase. Now to decompress data, the MCS server recovers the associated array D to a two-dimensional matrix which contains M ^ = ( b i , j ) k × k Next, the inverse 2D-DCT technique is employed to transform M ^ to a new matrix M ^ = ( a i , j ) k × k . The approach employed in the proposed SenseCrypt framework minimizes remarkably the number of transmitted data from mobile clients to the MCS application server. Realizing computational reduction is because sensitive sensor data with high data correlations have been compressed. After data decompression, the actual ASD can be obtained from the ASD*.

4. Results and Discussion

This section presents the results from the automatic annotation and signcryption of sensitive location information of MCS users by the proposed SenseCrypt framework.

4.1. Performance Evaluation of the Clustering Model

For accurate clustering analysis, measuring the distance of objects in the dataset is an important task. There are several types of proximity measures that best fit different types of data. Nevertheless, Euclidean distance and Manhattan distance are mostly used for high dimensional data. In this paper, the K-means algorithm was implemented using the Euclidean distance metric. It is a significant metric for identifying the similarity and dissimilarity of generated clusters. It does this by calculating the root of squares between a pair of objects in a dataset. We performed the clustering analysis on 2 to 10 clusters and calculated the average silhouette coefficient against the clustering members. As presented in Table 5, the average silhouette is largest at a value of 0.81, that is when K = 2, hence the choice of K in the proposed framework. Furthermore, all the clusters are above the average, indicating that data from motion and location sensors in smartphones can be grouped into non-sensitive and sensitive groups. However, the average silhouette decreases slightly as the cluster value increases. Figure 5 shows the clustered data objects from the dataset. As can be seen from the silhouette plot, the non-sensitive data cluster (black colour) contains more data objects than the sensitive data cluster (green colour) based on the thickness of the plots. The clustering results justify the fact that some MCS sensing activities can be performed using only motion sensors since most users prefer to turn off their GPS sensor to preserve battery and/or their privacy. Thus affecting the availability of real-time location data.
The computational complexity of the K-means algorithm used in the framework for each iteration is O ( i n ) , where n is the number of features in the dataset and i is the value signifying the amount of information from the preceding iterations, which is constant. The number of iterations is 50 and the scale is from 2 to 10. Meanwhile, i was set to 8 and n (number of features) is higher than i (information), which means that the complexity is O ( n ) .

4.2. Performance Evaluation of the CLASC Scheme

In this subsection, we evaluate the performance of the CLASC scheme employed in the proposed SenseCrypt framework. We compare our CLASC scheme with schemes proposed by Eslami and Pakniat [27] and Basudan, Lin [28] using computation cost and communication overhead as evaluation metrics. The following parameters are used to measure the scheme’s efficiency:
  • T p : computation time of one pairing operation.
  • T m : computation time of a scalar multiplication point in G 1 .
  • T e : computation time of one exponentiation in G 2 .
The CLASC scheme in the proposed framework allows each M C i to signcrypt sensitive data at any given time. However, mobile clients cannot aggregate signcrypted data, unlike the aggregator that can aggregate multiple signcrypted sensitive data. The effective compression technique adopted in the framework further reduces the size of the sensitive data to be signcrypted. The signcryption algorithm required four multiplication operations in G 1 for the successful signing and encryption in the framework. A single pairing operation was required for the unsigncrypt process by the MCS application server ( A S R ) . Table 6 compares pairing time, scalar multiplication time and exponentiation time of the signcryption and unsigncryption processes of our scheme with schemes proposed by Eslami and Pakniat [27] and Basudan, Lin [28]. The comparison can also be visualized in Figure 6. Aggregate verification of the signature and unsigncrypt processes required two scalar multiplication operations. On the other hand, the receiver of the aggregated ciphertext S C S D a g r verifies the aggregated signatures in a single step and can verify multiple signatures published in different topics. The number of aggregate signatures can scale based on the scalability property on the MQTT protocol.
The communication overhead of the proposed scheme is derived from the length of the aggregated ciphertext S C S D a g r which is the compressed annotated sensitive data A S D * . The MQTT broker in the framework forwards the aggregated ciphertext to the MCS server. Since two parts of each ciphertext C i is required for decryption by the MCS server ( A S R ) ; the communication overhead of the CLASC scheme is a non-constant value. To this end, there exist n + 1 elements in G 1 for the security of the aggregated data S C S D a g r . Table 7 compares the computational cost and the communication overhead of the schemes discussed above.
Similar to the evaluation method used by Basudan [28], we employed an MNT curve [61] and the Weil/Tate pairing e ˜ : G 1 × G 1 G 2 curve, where q = 160 -bit and the degree of curve is 6. To obtain the running time of the cryptographic operations, the scheme was implemented on an Intel Core i7 (TM), 2.90 GHz dual-core machine (simulating operations of the ASR). Results from the cryptographic operations are presented in Table 8. The running time of our proposed scheme is compared with that of Basudan [28] in Figure 7.

4.3. Security Analysis

In this subsection, we analyze the security of the proposed SenseCrypt framework against some known attacks in mobile crowd sensing.

4.3.1. Resilience to Privileged Insider Attack

In the proposed framework, the MCS client M C i forwards his/her signcrypted sensitive data S C S D i to the aggregator. The S C S D i is the ciphertext C i = ( T i , W i β i ) , pseudonymized as S C S D i = ( Q i , S i g n c r y p t ( S e n s i t i v e D a t a ) ) . The pseudonym Q i preserves the identity of M C i from disclosure to the aggregator, MQTT broker and the MCS application server ( A S R ) . The Q i of M C i derived from a one-way hash function H 2 ( M C i ) protects the identity of M C i from insider attack since the aggregator or ( A S R ) does not know the secret value g i chosen by M C i .

4.3.2. Resilience to Replay Attack

Timestamps are used to avoid replay attacks in the SenseCrypt framework. Specifically, a timestamp mechanism is employed to ensure the freshness of each published message in the framework. An adversary A , cannot replay the sent S C S D a g r to the MCS application server A S R , since an ephemeral session key is used for the transfer of S C S D a g r . Additionally, the authentication message between the M C i , aggregator and A S R are protected. Hence, replay attacks cannot succeed in the proposed framework.

4.3.3. Resilience to Forgery Attacks

The first scenario deals with forgery attacks on mobile client M C i . In this case, an adversary A may eavesdrop or intercept the message transmitted from M C i in the framework. Then if A sends a forged message to the KGC (Key Generator Centre), the KGC extracts the value of [ k ] with the secret r P W r b then computes the hash [ h a ] . The KGC then verifies the legitimacy of the user by checking whether h a = [ r ( P W r a + Y p u b Q i ) ] . However, without the knowledge of the correct secret, A cannot compute the valid value [ r ]. Hence, the framework is secure against M C i forgery attack.
The second scenario is the KGC forgery attack. The message sent from the KGC to the mobile client M C i and MCS application server A S R is protected by the hash mechanism (SHA-256), using the computed key [ F p a r t = g i + s Q i ]. The adversary A cannot forge the message [ m i ] without knowing [ F p a r t ]. Additionally, without knowing the partial private key, an adversary A cannot forge a valid value [ ( F p a r t = g i ) ], which is verifiable by either the mobile client M C i or MCS application server A S R . Hence the proposed framework is secure against KGC forgery attack.

4.3.4. User Anonymity and Unlinkability

Users’ identity and location are two major privacy issues of concern for MCS participants. The participant’s real identity is vital in obtaining his/her behaviour. Hence, the participant’s identity and related information must be protected from unauthorized parties. In the proposed framework, the identity of the mobile client M C i is never published over the network, the pseudonym Q i is used instead. This technique makes it impossible for an adversary to reveal the identity of participants from intercepted messages. Since [ Q i ] is unlinkable, outsiders or even other participants lack the knowledge of who is communicating with the aggregator or MCS application server at any given time. Hence, the proposed framework prevents identity disclosure and preserves participants’ privacy. Correspondingly, signcrypting the location data of participants S C S D i , ensures that only the MCS server A S R with the corresponding private key can unsigncrypt and obtain the plaintext information (sensitive location data) of participants.

4.3.5. Confidentiality and Integrity of Sensitive Location Data

Signcryption of sensitive location data by the mobile client M C i generates a ciphertext C i = ( T i , W i , β i ) . In this case, T i , W i satisfy the encryption properties of the CLASC scheme and β i performs signing, all in one step. A S R is the only entity that can unsigncrypt S C S D i (signcrypted sensitive data) through the computation of T i , W i , β i . With this in place, confidentiality is achieved even if an active man-in-the-middle attacker eavesdrops on transmitted sensor data. S C S D i remains undisclosed and cannot be modified, hence ensuring the integrity of sensitive data.

5. Conclusions

In this paper, we propose a framework that annotates sensor data and signcrypts sensitive location data of mobile crowd sensing participants. The annotation module of the framework employs the K-means algorithm for the labelling of data from multiple smartphone sensors (accelerometer, gyroscope, magnetometer and GPS) into non-sensitive and sensitive clusters. The data signcryption module leverages the signing and encryption properties of the certificateless aggregation signcryption scheme (CLASC) to secure sensitive location data of MCS participants. The paper also puts forward a novel implementation technique that uses efficient data compression technique and MQTT protocol to minimize the computational cost and communication overhead associated with CLASC schemes. Results show that the CLASC scheme implemented in the proposed framework is efficient and robust against attacks such as privilege insider attack, forgery and replay attacks while ensuring confidentiality, integrity and privacy. Presently, the framework only handles location data as sensitive data of interest. As future work, the framework can be extended to incorporate more sensors and annotate other sensitive data in mobile crowd sensing.

Author Contributions

N.P.O. handled the methodology, formal analysis, Writing—Original draft preparation and visualization. The conceptualization came from M.M.S. M.M.S. also took care of the validation, Writing—Review and editing of the manuscript. All authors have read and agreed to the published version of the manuscript.

Funding

Funding assistance for the paper is from Universiti Sains Malaysia Research Creativity and Management Office (RCMO) and RUI Grant (No: 1001/PKOMP/8014003).

Conflicts of Interest

The authors declare no conflict of interest regarding the research, authorship, and/or publication of this article.

References

  1. Distefano, S.; Longo, F.; Scarpa, M. Investigating mobile crowdsensing application performance. In Proceedings of the Third ACM International Symposium on Design And Analysis of Intelligent Vehicular Networks and Applications, Barcelona, Spain, 3–8 November 2013; pp. 77–84. [Google Scholar]
  2. Ganti, R.K.; Ye, F.; Lei, H. Mobile crowdsensing: Current state and future challenges. IEEE Commun. Mag. 2011, 49, 32–38. [Google Scholar] [CrossRef]
  3. Lane, N.D.; Miluzzo, E.; Lu, H.; Peebles, D.; Choudhury, T.; Campbell, A.T. A survey of mobile phone sensing. IEEE Commun. Mag. 2010, 48, 140–150. [Google Scholar] [CrossRef]
  4. Christin, D.; Reinhardt, A.; Kanhere, S.S.; Hollick, M. A survey on privacy in mobile participatory sensing applications. J. Syst. Softw. 2011, 84, 1928–1946. [Google Scholar] [CrossRef]
  5. Macias, E.; Suarez, A.; Lloret, J. Mobile sensing systems. Sensors 2013, 13, 17292–17321. [Google Scholar] [CrossRef] [PubMed]
  6. Ma, S.; Zheng, Y.; Wolfson, O. T-share: A large-scale dynamic taxi ridesharing service. In Proceedings of the IEEE 29th International Conference on Data Engineering (ICDE), Brisbane, Australia, 8–12 April 2013; pp. 410–421. [Google Scholar]
  7. Khan, W.Z.; Xiang, Y.; Aalsalem, M.Y.; Arshad, Q. Mobile phone sensing systems: A survey. IEEE Commun. Surv. Tutor. 2013, 15, 402–427. [Google Scholar] [CrossRef]
  8. Guo, B.; Wang, Z.; Yu, Z.; Wang, Y.; Yen, N.Y.; Huang, R.; Zhou, X. Mobile crowd sensing and computing: The review of an emerging human-powered sensing paradigm. ACM Comput. Surv. 2015, 48, 7–15. [Google Scholar] [CrossRef]
  9. Tsung-Te Lai, T.; Lin, C.-Y.; Su, Y.-Y.; Chu, H.-H. BikeTrack: Tracking stolen bikes through everyday mobile phones and participatory sensing. In Proceedings of the 2nd International Workshop on Sensing Applications on Mobile Phones (PhoneSense), Seattle, WA, USA, 1–4 November 2011; pp. 1–5. [Google Scholar]
  10. Leonardi, C.; Cappellotto, A.; Caraviello, M.; Lepri, B.; Antonelli, F. SecondNose: An air quality mobile crowdsensing system. In Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational, Helsinki, Finland, 26–30 October 2014; pp. 1051–1054. [Google Scholar]
  11. He, D.; Chan, S.; Guizani, M. User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel. Commun. 2015, 22, 28–34. [Google Scholar] [CrossRef]
  12. Zhang, D.; Wang, L.; Xiong, H.; Guo, B. 4W1H in mobile crowd sensing. IEEE Commun. Mag. 2014, 52, 42–48. [Google Scholar] [CrossRef]
  13. Owoh, N.P.; Singh, M.M. Security analysis of mobile crowd sensing applications. Appl. Comput. Inform. 2018, 1–11. [Google Scholar] [CrossRef]
  14. Talasila, M.; Curtmola, R.; Borcea, C. Mobile crowd sensing. Google Sch. 2015, 6, 1–10. [Google Scholar]
  15. Jin, H.; Su, L.; Xiao, H.; Nahrstedt, K. nception: Incentivizing privacy-preserving data aggregation for mobile crowd sensing systems. In Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Paderborn, Germany, 21–25 July 2016; pp. 341–350. [Google Scholar]
  16. Ma, H.; Zhao, D.; Yuan, P. Opportunities in mobile crowd sensing. IEEE Commun. Mag. 2014, 52, 29–35. [Google Scholar] [CrossRef]
  17. Radu, V.; Lane, N.D.; Bhattacharya, S.; Mascolo, C.; Marina, M.K.; Kawsar, F. Towards multimodal deep learning for activity recognition on mobile devices. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, Heidelberg, Germany, 12–16 September 2016; pp. 185–188. [Google Scholar]
  18. Hammerla, N.Y.; Halloran, S.; Ploetz, T. Deep, convolutional, and recurrent models for human activity recognition using wearables. arXiv 2016, arXiv:1604.08880. [Google Scholar]
  19. Ronao, C.A.; Cho, S.-B. Human activity recognition with smartphone sensors using deep learning neural networks. Expert Syst. Appl. 2016, 59, 235–244. [Google Scholar] [CrossRef]
  20. Ordóñez, F.J.; Roggen, D. Deep convolutional and lstm recurrent neural networks for multimodal wearable activity recognition. Sensors 2016, 16, 115. [Google Scholar] [CrossRef] [Green Version]
  21. Pius Owoh, N.; Mahinderjit Singh, M.; Zaaba, Z.F. Automatic Annotation of Unlabeled Data from Smartphone-Based Motion and Location Sensors. Sensors 2018, 18, 2134. [Google Scholar] [CrossRef] [Green Version]
  22. Guo, B.; Yu, Z.; Zhou, X.; Zhang, D. From participatory sensing to mobile crowd sensing. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Budapest, Hungary, 24–28 March 2014; pp. 593–598. [Google Scholar]
  23. Das, T.; Mohan, P.; Padmanabhan, V.N.; Ramjee, R.; Sharma, A. PRISM: Platform for remote sensing using smartphones. In Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, San Francisco, CA, USA, 15–18 June 2010; pp. 63–76. [Google Scholar]
  24. Shin, M.; Cornelius, C.; Peebles, D.; Kapadia, A.; Kotz, D.; Triandopoulos, N. AnonySense: A system for anonymous opportunistic sensing. Pervasive Mob. Comput. 2011, 7, 16–30. [Google Scholar] [CrossRef] [Green Version]
  25. De Cristofaro, E.; Soriente, C. Extended capabilities for a privacy-enhanced participatory sensing infrastructure (PEPSI). IEEE Trans. Inf. Forensics Secur. 2013, 8, 2021–2033. [Google Scholar] [CrossRef] [Green Version]
  26. Liu, B.; Zhou, W.; Zhu, T.; Zhou, H.; Lin, X. Invisible hand: A privacy preserving mobile crowd sensing framework based on economic models. IEEE Trans. Veh. Technol. 2017, 66, 4410–4423. [Google Scholar] [CrossRef]
  27. Eslami, Z.; Pakniat, N. Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model. J. King Saud Univ. Comput. Inf. Sci. 2014, 26, 276–286. [Google Scholar] [CrossRef] [Green Version]
  28. Basudan, S.; Lin, X.; Sankaranarayanan, K. A privacy-preserving vehicular crowdsensing-based road surface condition monitoring system using fog computing. IEEE Internet Things J. 2017, 4, 772–782. [Google Scholar] [CrossRef]
  29. Andersen, M.S. On limitations of existing methods for location privacy. In Proceedings of the 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use, San Francisco, CA, USA, 12–15 June 2011; pp. 1–8. [Google Scholar]
  30. Alswailim, M.A.; Zulkernine, M.; Hassanein, H.S. Classification of participatory sensing privacy schemes. In Proceedings of the 39th Annual IEEE Conference on Local Computer Networks Workshops, Edmonton, AB, Canada, 8–11 September 2014; pp. 761–767. [Google Scholar]
  31. Sweeney, L. A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 2002, 10, 557–570. [Google Scholar] [CrossRef] [Green Version]
  32. Huang, K.L.; Kanhere, S.S.; Hu, W. A privacy-preserving reputation system for participatory sensing. In Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, 22–25 October 2012; pp. 10–18. [Google Scholar]
  33. Ghinita, G. Privacy for location-based services. Synth. Lect. Inf. Secur. Priv. Trust 2013, 4, 1–85. [Google Scholar] [CrossRef] [Green Version]
  34. Kazemi, L.; Shahabi, C. A privacy-aware framework for participatory sensing. ACM SIGKDD Explor. Newsl. 2011, 13, 43–51. [Google Scholar] [CrossRef] [Green Version]
  35. Freudiger, J.; Manshaei, M.H.; Le Boudec, J.-Y.; Hubaux, J.-P. On the age of pseudonyms in mobile ad hoc networks. In Proceedings of the IEEE INFOCOM, San Diego, CA, USA, 14–19 March 2010; pp. 1–9. [Google Scholar]
  36. Ma, P.; Tao, D.; Wu, T. A pseudonym based anonymous identity authentication mechanism for mobile crowd sensing. In Proceedings of the 2017 3rd International Conference on Big Data Computing and Communications (BIGCOM), Chengdu, China, 10–11 August 2017; pp. 10–14. [Google Scholar]
  37. Andrés, M.E.; Bordenabe, N.E.; Chatzikokolakis, K.; Palamidessi, C. Geo-indistinguishability: Differential privacy for location-based systems. arXiv 2012, arXiv:1212.1984. [Google Scholar]
  38. Dwork, C. The differential privacy frontier. In Proceedings of the Theory of Cryptography Conference, San Francisco, CA, USA, 15–17 March 2009; pp. 496–502. [Google Scholar]
  39. Wang, L.; Zhang, D.; Yang, D.; Lim, B.Y.; Ma, X. Differential location privacy for sparse mobile crowdsensing. In Proceedings of the IEEE 16th International Conference on Data Mining (ICDM), Barcelona, Spain, 12–15 December 2016; pp. 1257–1262. [Google Scholar]
  40. Wang, Z.; Hu, J.; Lv, R.; Wei, J.; Wang, Q.; Yang, D.; Qi, H. Personalized privacy-preserving task allocation for mobile crowdsensing. IEEE Trans. Mob. Comput. 2018, 18, 1330–1341. [Google Scholar] [CrossRef]
  41. Zhang, H.; Dong, A.; Jin, S.; Yuan, D. Joint transceiver and power splitting optimization for multiuser MIMO SWIPT under MSE QoS constraints. IEEE Trans. Veh. Technol. 2017, 66, 7123–7135. [Google Scholar] [CrossRef]
  42. Miao, C.; Jiang, W.; Su, L.; Li, Y.; Guo, S.; Qin, Z.; Xiao, H.; Gao, J.; Ren, K. Cloud-enabled privacy-preserving truth discovery in crowd sensing systems. In Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, Seoul, Korea, 1–4 November 2015; pp. 183–196. [Google Scholar]
  43. Miao, C.; Su, L.; Jiang, W.; Li, Y.; Tian, M. A lightweight privacy-preserving truth discovery framework for mobile crowd sensing systems. In Proceedings of the IEEE INFOCOM 2017-IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; pp. 1–9. [Google Scholar]
  44. Zheng, Y.; Duan, H.; Wang, C. Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2475–2489. [Google Scholar] [CrossRef]
  45. Al-Riyami, S.S.; Paterson, K.G. Certificateless public key cryptography. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8–12 December 2019; pp. 452–473. [Google Scholar]
  46. Zheng, Y. Signcryption and its applications in efficient public key solutions. In Proceedings of the International Workshop on Information Security, Jeju Island, South Korea, 21–24 August 2019; pp. 291–312. [Google Scholar]
  47. Barbosa, M.; Farshim, P. Certificateless signcryption. In Proceedings of the ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, 18–20 March 2008; pp. 369–372. [Google Scholar]
  48. Selvi, S.S.D.; Vivek, S.S.; Shriram, J.; Kalaivani, S.; Rangan, C.P. Identity based aggregate signcryption schemes. In Proceedings of the International Conference on Cryptology in India, New Delhi, India, 9–12 December 2018; pp. 378–397. [Google Scholar]
  49. Liu, Z.; Hu, Y.; Zhang, X.; Ma, H. Certificateless signcryption scheme in the standard model. Inf. Sci. 2010, 180, 452–464. [Google Scholar] [CrossRef]
  50. Weng, J.; Yao, G.; Deng, R.H.; Chen, M.-R.; Li, X. Cryptanalysis of a certificateless signcryption scheme in the standard model. Inf. Sci. 2011, 181, 661–667. [Google Scholar] [CrossRef]
  51. Miao, S.; Zhang, F.; Li, S.; Mu, Y. On security of a certificateless signcryption scheme. Inf. Sci. 2013, 232, 475–481. [Google Scholar] [CrossRef] [Green Version]
  52. Freedman, R. Smartphone Recorded Driving Sensor Data: Indianapolis International Airport to Urbana, IL; University of Illinois at Urbana-Champaign: Champaign, IL, USA, 2017; pp. 1–8. [Google Scholar]
  53. Alsheikh, M.A.; Lin, S.; Niyato, D.; Tan, H.-P. Machine learning in wireless sensor networks: Algorithms, strategies, and applications. IEEE Commun. Surv. Tutor. 2014, 16, 1996–2018. [Google Scholar] [CrossRef] [Green Version]
  54. Jain, A.K. Data clustering: 50 years beyond K-means. Pattern Recognit. Lett. 2010, 31, 651–666. [Google Scholar] [CrossRef]
  55. Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 18–22 August 2019; pp. 213–229. [Google Scholar]
  56. Lu, H.; Xie, Q. An efficient certificateless aggregate signcryption scheme from pairings. In Proceedings of the International Conference on Electronics, Communications and Control (ICECC), Ningbo, China, 9–11 September 2011; pp. 132–135. [Google Scholar]
  57. Wang, Y.-C.; Hsieh, Y.-Y.; Tseng, Y.-C. Compression and storage schemes in a sensor network with spatial and temporal coding techniques. In Proceedings of the VTC Spring 2008-IEEE Vehicular Technology Conference, Singapore, 11–14 May 2008; pp. 148–152. [Google Scholar]
  58. Shodan. 2016. Available online: https://www.shodan.io/search?query=mqtt (accessed on 15 October 2019).
  59. Banks, A.; Gupta, R. MQTT Version 3.1.1. OASIS Standard. 2014, pp. 11–20. Available online: http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/csprd02/mqtt-v3.1.1-csprd02.html (accessed on 24 May 2019).
  60. Naik, N. Choice of effective messaging protocols for IoT systems: MQTT, CoAP, AMQP and HTTP. In Proceedings of the IEEE international systems engineering symposium (ISSE), Vienna, Austria, 11–13 October 2017; pp. 1–7. [Google Scholar]
  61. Miyaji, A.; Nakabayashi, M.; Takano, S. New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2001, 84, 1234–1243. [Google Scholar]
Figure 1. A system diagram of our SenseCrypt framework and its interactions with the standard MCS architecture.
Figure 1. A system diagram of our SenseCrypt framework and its interactions with the standard MCS architecture.
Sensors 20 03280 g001
Figure 2. Flowchart of the SenseCrypt framework.
Figure 2. Flowchart of the SenseCrypt framework.
Sensors 20 03280 g002
Figure 3. Model implementation of the CLASC scheme.
Figure 3. Model implementation of the CLASC scheme.
Sensors 20 03280 g003
Figure 4. Efficient data transfer using the message queuing telemetry transport protocol.
Figure 4. Efficient data transfer using the message queuing telemetry transport protocol.
Sensors 20 03280 g004
Figure 5. Converged clusters.
Figure 5. Converged clusters.
Sensors 20 03280 g005
Figure 6. Efficiency evaluation comparison with other CLASC schemes.
Figure 6. Efficiency evaluation comparison with other CLASC schemes.
Sensors 20 03280 g006
Figure 7. Evaluation of the running time of cryptographic operations.
Figure 7. Evaluation of the running time of cryptographic operations.
Sensors 20 03280 g007
Table 1. A summary of anonymity-based schemes in MCS.
Table 1. A summary of anonymity-based schemes in MCS.
Anonymity-Based Approaches
Authors/[Reference]TechniquesRemarks
[31,32]K-anonymityVulnerable to homogeneity attacks, which exploits the monotony of some features to identify users from the set of K participants.
[33,34]CloakingAn attacker may know users’ location a priori, hence revealing his location.
[35,36]PseudonymizationUsers’ identities can still be linked from inferred information.
[38,39]Differential PrivacyNoise added to sensor data reduces data quality.
Table 2. A Summary of Cryptographic-based Security Schemes in MCS.
Table 2. A Summary of Cryptographic-based Security Schemes in MCS.
Cryptographic -Based Approaches
Authors/[Reference]TechniquesRemarks
[42,43,44]Homomorphic encryption
  • Non-trivial (i.e., incurs a high computational and communicational cost).
  • Non-repudiation is not offered.
[27,28]Certificateless Aggregate Signcryption (CLASC)
  • Requires enhancement for optimal performance when implemented in a generic framework.
Table 3. Extracted Features for Automatic Annotation.
Table 3. Extracted Features for Automatic Annotation.
S/NFeatures Description
1.AxAccelerometer X-axis ( m / s 2 )
2.AyAccelerometer Y-axis ( m / s 2 )
3.AzAccelerometer Z-axis ( m / s 2 )
4.GxGyroscope X-axis ( m / s 2 )
5.GyGyroscope Y-axis ( m / s 2 )
6.GzGyroscope Z-axis ( m / s 2 )
7.MxMagnetometer X-axis ( T )
8.MyMagnetometer Y-axis ( T )
9.MzMagnetometer Z-axis ( T )
10.LatLocation (Latitude)
11.LongLocation (Longitude)
Table 4. Mathematical Notations I.
Table 4. Mathematical Notations I.
SymbolsDescription
G 1 Additive Group
{ m i } i n Aggregated Ciphertext C on Messages
S C S D a g r Aggregated Signcrypted Sensitive Data
ASDAnnotated Sensitive Data
Bit-length of plaintext
C i Ciphertext
A S D * Compressed ASD
Exclusive OR
P Group Generator
H Hash function
h ¯ a Hashed message
s Master private key
Y p u b Master public key
A S R MCS Application Server
m i Message
M C i Mobile Client user
G 2 Multiplicative Group
e ˜ Non-degenerated Bilinear map
q Prime order
r Random number
I D R Receiver
I D q Receiver’s identity
( F p a r t ( R ) ) Receiver’s Partial private key
( g R , F p a r t ( R ) ) Receiver’s private key
X R Receiver’s Public key
g i Secret value
k Security parameter
I D i Sender
F p a r t Sender’s Partial private key
( g i , F p a r t ) Sender’s private key
X i Sender’s Public keys
S C S D i Signcrypted Sensitive Data
( T i , W i , β i ) Signcryption parameters in the ciphertext
Δ State information
Q i User’s Pseudonym
e ˜ : G 1 × G 1 G 2 Bilinear map
{ I D i } i n Users’ identity
Table 5. Data points in generated clusters.
Table 5. Data points in generated clusters.
Value of KSilhouette Analysis Score
20.81468
30.72697
40.74805
50.66491
60.62944
70.59680
80.59756
90.53191
100.53458
Table 6. Comparison of cryptographic operations with other CLASC schemes.
Table 6. Comparison of cryptographic operations with other CLASC schemes.
Signcrypt
Schemes T p T m T e
[27]240
[28]060
Proposed SenseCrypt240
UnSigncrypt
Schemes T p T m T e
[27]330
[28]420
Proposed SenseCrypt120
Table 7. Analysis of computational and communication overhead.
Table 7. Analysis of computational and communication overhead.
ReferenceComputational Cost Computational Overhead
[27] 5 T p + 6 T m ( n + 1 ) | G 1 | + n | m |
[28] 4 T p + 8 T m ( n + 1 ) | G 1 | + n | m |
Proposed SenseCrypt 3 T p + 6 T m ( n + 1 ) | G 1 | + n | m |
Table 8. Time of Cryptographic Operations in SenseCrypt Framework.
Table 8. Time of Cryptographic Operations in SenseCrypt Framework.
OperationsRunning TimeDescriptions
T p 2.02 msThe time for one pairing operation
T m 0.1 msThe time for a scalar point multiplication operation

Share and Cite

MDPI and ACS Style

Pius Owoh, N.; Mahinderjit Singh, M. SenseCrypt: A Security Framework for Mobile Crowd Sensing Applications. Sensors 2020, 20, 3280. https://doi.org/10.3390/s20113280

AMA Style

Pius Owoh N, Mahinderjit Singh M. SenseCrypt: A Security Framework for Mobile Crowd Sensing Applications. Sensors. 2020; 20(11):3280. https://doi.org/10.3390/s20113280

Chicago/Turabian Style

Pius Owoh, Nsikak, and Manmeet Mahinderjit Singh. 2020. "SenseCrypt: A Security Framework for Mobile Crowd Sensing Applications" Sensors 20, no. 11: 3280. https://doi.org/10.3390/s20113280

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop