{"id":"https://openalex.org/W4404612334","doi":"https://doi.org/10.1145/3690134.3694826","title":"Detecting Mobile Crowdsensing Sybil Attackers via Presence Verification","display_name":"Detecting Mobile Crowdsensing Sybil Attackers via Presence Verification","publication_year":2024,"publication_date":"2024-11-19","ids":{"openalex":"https://openalex.org/W4404612334","doi":"https://doi.org/10.1145/3690134.3694826"},"language":"en","primary_location":{"id":"doi:10.1145/3690134.3694826","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690134.3694826","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3690134.3694826","source":null,"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Sixth Workshop on CPS&amp;IoT Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3690134.3694826","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024303799","display_name":"Cihan Eryonucu","orcid":"https://orcid.org/0000-0003-4761-7676"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Cihan Eryonucu","raw_affiliation_strings":["Networked Systems Security Group, KTH Royal Institute of Technology, Stockholm, Sweden"],"raw_orcid":"https://orcid.org/0000-0003-4761-7676","affiliations":[{"raw_affiliation_string":"Networked Systems Security Group, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030735377","display_name":"Panos Papadimitratos","orcid":"https://orcid.org/0000-0002-3267-5374"},"institutions":[{"id":"https://openalex.org/I86987016","display_name":"KTH Royal Institute of Technology","ror":"https://ror.org/026vcq606","country_code":"SE","type":"education","lineage":["https://openalex.org/I86987016"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Panos Papadimitratos","raw_affiliation_strings":["Networked Systems Security Group, KTH Royal Institute of Technology, Stockholm, Sweden"],"raw_orcid":"https://orcid.org/0000-0002-3267-5374","affiliations":[{"raw_affiliation_string":"Networked Systems Security Group, KTH Royal Institute of Technology, Stockholm, Sweden","institution_ids":["https://openalex.org/I86987016"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024303799"],"corresponding_institution_ids":["https://openalex.org/I86987016"],"apc_list":null,"apc_paid":null,"fwci":0.6623,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.76264777,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"118","last_page":"124"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/crowdsensing","display_name":"Crowdsensing","score":0.8584099411964417},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7490307092666626},{"id":"https://openalex.org/keywords/sybil-attack","display_name":"Sybil attack","score":0.5726088881492615},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4186604619026184},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.30419766902923584},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.1963616907596588}],"concepts":[{"id":"https://openalex.org/C2780821482","wikidata":"https://www.wikidata.org/wiki/Q25381721","display_name":"Crowdsensing","level":2,"score":0.8584099411964417},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7490307092666626},{"id":"https://openalex.org/C2777505653","wikidata":"https://www.wikidata.org/wiki/Q4470796","display_name":"Sybil attack","level":3,"score":0.5726088881492615},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4186604619026184},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.30419766902923584},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.1963616907596588}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3690134.3694826","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690134.3694826","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3690134.3694826","source":null,"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Sixth Workshop on CPS&amp;IoT Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3690134.3694826","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3690134.3694826","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3690134.3694826","source":null,"license":"cc-by-nc-sa","license_id":"https://openalex.org/licenses/cc-by-nc-sa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Sixth Workshop on CPS&amp;IoT Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4404612334.pdf"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W629323144","https://openalex.org/W1520914943","https://openalex.org/W2016380441","https://openalex.org/W2151940804","https://openalex.org/W2276327163","https://openalex.org/W2561268975","https://openalex.org/W2811319541","https://openalex.org/W2964280086","https://openalex.org/W2994840128","https://openalex.org/W4246451129"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2563347706","https://openalex.org/W2608033733","https://openalex.org/W2340192855","https://openalex.org/W2982574594","https://openalex.org/W3015348864","https://openalex.org/W2761160045","https://openalex.org/W2792327927"],"abstract_inverted_index":{"Mobile":[0],"crowdsensing":[1],"(MCS)":[2],"relies":[3],"on":[4,106,170,180],"smart,":[5],"portable":[6],"devices":[7,83],"to":[8,44,58,76,118,133,137,194,205],"conveniently":[9],"collect":[10],"sensory":[11],"data":[12],"from":[13],"our":[14,25],"surroundings.":[15],"MCS-based":[16,46],"apps,":[17],"e.g.,":[18],"Google":[19],"Maps,":[20],"are":[21,112,214],"already":[22,89],"well-integrated":[23],"into":[24],"everyday":[26],"lives.":[27],"However,":[28],"Sybil-based":[29],"attacks,":[30],"with":[31,129,162,208],"an":[32,78],"attacker":[33],"creating":[34],"many":[35],"fake":[36],"identities":[37],"and":[38,62,87,140,165],"the":[39,64,92,119,167,171,196,199,216,219],"illusion":[40],"of":[41,66,91,182,198],"numerous":[42],"contributors":[43,88],"influence":[45],"functionality,":[47],"pose":[48],"a":[49,97,125,158,177,186],"significant":[50],"threat.":[51],"MCS":[52,93,100,120],"systems":[53],"need":[54],"security,":[55],"including":[56],"mechanisms":[57],"vet":[59],"incoming":[60,71],"users":[61,111,138,164],"prevent":[63],"introduction":[65],"Sybil":[67,188],"nodes.":[68],"Intuitively,":[69],"each":[70,130],"contributor":[72],"can":[73],"be":[74,77],"verified":[75],"actual":[79],"device":[80],"near":[81],"other":[82,85],"by":[84,157],"newcomers":[86],"part":[90],"system.":[94],"We":[95,190],"propose":[96],"novel":[98],"cooperative":[99],"user":[101,131],"presence":[102,136,153],"verification":[103,154],"protocol":[104,123,168,175,220],"based":[105,169],"this":[107],"idea,":[108],"also":[109],"ensuring":[110],"physically":[113],"present":[114],"in":[115,148,218],"locations":[116],"relevant":[117],"tasks.":[121],"The":[122,152,174],"leverages":[124],"commodity":[126],"component,":[127],"Bluetooth,":[128],"broadcasting":[132],"prove":[134],"their":[135],"listening":[139],"recording":[141],"Received":[142],"Signal":[143],"Strength":[144],"Indicator":[145],"(RSSI)":[146],"values":[147],"multiple":[149,183],"randomized":[150],"rounds.":[151],"is":[155],"done":[156],"simple":[159],"server":[160],"tasked":[161],"registering":[163],"orchestrating":[166],"collected":[172],"information.":[173],"identifies":[176],"broadcast":[178],"signal":[179],"behalf":[181],"users,":[184],"indicating":[185],"potential":[187],"behavior.":[189],"conduct":[191],"extensive":[192],"simulations":[193],"evaluate":[195],"performance":[197],"proposed":[200],"method,":[201],"demonstrating":[202],"its":[203],"ability":[204],"find":[206],"Sybils":[207,213],"high":[209],"accuracy":[210],"even":[211],"when":[212],"nearly":[215],"majority":[217],"session.":[221]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
