Crowdsensing

Last updated

Crowdsensing, sometimes referred to as mobile crowdsensing, is a technique where a large group of individuals having mobile devices capable of sensing and computing (such as smartphones, tablet computers, wearables) collectively share data and extract information to measure, map, analyze, estimate or infer (predict) any processes of common interest. In short, this means crowdsourcing of sensor data from mobile devices.

Contents

Background

Devices equipped with various sensors have become ubiquitous. Most smartphones can sense ambient light, noise (through the microphone), location (through the GPS), movement (through the accelerometer), and more. These sensors can collect vast quantities of data that are useful in a variety of ways. For example, GPS and accelerometer data can be used to locate potholes in cities, and microphones can be used with GPS to map noise pollution. [1]

The term "mobile crowdsensing" was coined by Raghu Ganti, Fan Ye, and Hui Lei in 2011. [1] Mobile crowdsensing belongs to three main types: environmental (such as monitoring pollution), infrastructure (such as locating potholes), and social (such as tracking exercise data within a community). [1] Current crowdsensing applications operate based on the assumption that all users voluntarily submit the sensing data leading to extensive user participation. [2] It can also indicate the way mobile device users form microcrowds based on a specific crowdsensing activity. [3]

Types

Based on the type of involvement from the users, mobile crowdsensing can be classified into two types:

Taking advantage of the ubiquitous presence of powerful mobile computing devices (especially smartphones) in recent years, it has become an appealing method to businesses that wish to collect data without making large-scale investments. Numerous technology companies use this technique to offer services based on the big data collected, some of the most notable examples being Facebook, Google, and Uber.

Process

Mobile crowdsensing occurs in three stages: data collection, data storage, and data upload. [6]

Data collection draws on sensors available through the Internet of things. [7] There are three main strategies for collecting this data: [8]

The data collection phase can also involve a process called deduplication, which involves removing redundant information from a data set to lower costs and improve user experience. [8] The deduplication process filters and compresses the data that has been collected before it gets uploaded.

The second stage involves the storage of data in the user's device until it gets another user to share and communicate. [3] For instance, videos monitoring an activity (e.g. traffic) may be stored on a user's device for a specific period and are then transmitted to a person or institution capable of taking action. [9]

An example of mobile crowdsensing is when mobile phone users activate the mobile sensor, including Google Maps and Snapchat that collect and share local information to the internet. [10] The app retrieves information such as location, birthday, gender, and more. [10]

Challenges

Resource limitations

Mobile crowdsensing potential is limited by constraints involving energy, bandwidth, and computation power. Using the GPS, for example, drains batteries, but location can also be tracked using Wi-Fi and GSM, although these are less accurate. [1] Eliminating redundant data can also reduce energy and bandwidth costs, as can restricting data sensing when quality is unlikely to be high (e.g., when two photos are taken in the same location, the second is unlikely to provide new information). [8]

Privacy, security, and data integrity

The data collected through mobile crowdsensing can be sensitive to individuals, revealing personal information such as home and work locations and the routes used when commuting between the two. Ensuring the privacy and security of personal information collected through mobile crowdsensing is therefore important.

Mobile crowdsensing can use three main methods to protect privacy: [1]

Data integrity can also be a problem when using mobile crowdsensing, especially when the program is opt in; in these situations, people can either unintentionally or maliciously contribute false data. [1] [12] Protecting data integrity can involve filtering, quality estimation, etc. Other solutions include installing collocated infrastructure to act as a witness or by using trusted hardware that is already installed on smartphones. However, both of these methods can be expensive or energy intensive. [1]

See also

Related Research Articles

Location-based service (LBS) is a general term denoting software services which use geographic data and information to provide services or information to users. LBS can be used in a variety of contexts, such as health, indoor object search, entertainment, work, personal life, etc. Commonly used examples of location-based services include navigation software, social networking services, location-based advertising, and tracking systems. LBS can also include mobile commerce when taking the form of coupons or advertising directed at customers based on their current location. LBS also includes personalized weather services and even location-based games.

<span class="mw-page-title-main">Intelligent transportation system</span> Advanced application

An intelligent transportation system (ITS) is an advanced application which aims to provide innovative services relating to different modes of transport and traffic management and enable users to be better informed and make safer, more coordinated, and 'smarter' use of transport networks.

Automatic vehicle location is a means for automatically determining and transmitting the geographic location of a vehicle. This vehicle location data, from one or more vehicles, may then be collected by a vehicle tracking system to manage an overview of vehicle travel. As of 2017, GPS technology has reached the point of having the transmitting device be smaller than the size of a human thumb, able to run 6 months or more between battery charges, easy to communicate with smartphones — all for less than $20 USD.

<span class="mw-page-title-main">Mobile computing</span> Human–computer interaction in which a computer is expected to be transported during normal usage

Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage and allow for transmission of data, which can include voice and video transmissions. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats, and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.

<span class="mw-page-title-main">Mobile device</span> Small, hand-held computing device

A mobile device, also referred to as a digital assistant, is a computer small enough to hold and operate in the hand. Mobile devices typically have a flat LCD or OLED screen, a touchscreen interface, and digital or physical buttons. They may also have a physical keyboard. Many mobile devices can connect to the Internet and connect with other devices, such as car entertainment systems or headsets, via Wi-Fi, Bluetooth, cellular networks, or near-field communication. Integrated cameras, the ability to place and receive voice and video telephone calls, video games, and Global Positioning System (GPS) capabilities are common. Power is typically provided by a lithium-ion battery. Mobile devices may run mobile operating systems that allow third-party applications to be installed and run.

<span class="mw-page-title-main">Mobile phone tracking</span> Identifying the location of a mobile phone

Mobile phone tracking is a process for identifying the location of a mobile phone, whether stationary or moving. Localization may be affected by a number of technologies, such as the multilateration of radio signals between (several) cell towers of the network and the phone or by simply using GNSS. To locate a mobile phone using multilateration of mobile radio signals, the phone must emit at least the idle signal to contact nearby antenna towers and does not require an active call. The Global System for Mobile Communications (GSM) is based on the phone's signal strength to nearby antenna masts.

<span class="mw-page-title-main">Traffic reporting</span> Communication of road conditions

Traffic reporting is the near real-time distribution of information about road conditions such as traffic congestion, detours, and traffic collisions. The reports help drivers anticipate and avoid traffic problems. Traffic reports, especially in cities, may also report on major delays to mass transit that does not necessarily involve roads. In addition to periodic broadcast reports, traffic information can be transmitted to GPS units, smartphones, and personal computers.

Collaborative mapping, also known as citizen mapping, is the aggregation of Web mapping and user-generated content, from a group of individuals or entities, and can take several distinct forms. With the growth of technology for storing and sharing maps, collaborative maps have become competitors to commercial services, in the case of OpenStreetMap, or components of them, as in Google Map Maker Waze and Yandex Map Editor.

<span class="mw-page-title-main">Indoor positioning system</span> Network of devices used to wirelessly locate objects inside a building

An indoor positioning system (IPS) is a network of devices used to locate people or objects where GPS and other satellite technologies lack precision or fail entirely, such as inside multistory buildings, airports, alleys, parking garages, and underground locations.

Distributed GIS refers to GI Systems that do not have all of the system components in the same physical location. This could be the processing, the database, the rendering or the user interface. It represents a special case of distributed computing, with examples of distributed systems including Internet GIS, Web GIS, and Mobile GIS. Distribution of resources provides corporate and enterprise-based models for GIS. Distributed GIS permits a shared services model, including data fusion based on Open Geospatial Consortium (OGC) web services. Distributed GIS technology enables modern online mapping systems, Location-based services (LBS), web-based GIS and numerous map-enabled applications. Other applications include transportation, logistics, utilities, farm / agricultural information systems, real-time environmental information systems and the analysis of the movement of people. In terms of data, the concept has been extended to include volunteered geographical information. Distributed processing allows improvements to the performance of spatial analysis through the use of techniques such as parallel processing.

A sensor grid integrates wireless sensor networks with grid computing concepts to enable real-time data collection and the sharing of computational and storage resources for sensor data processing and management. It is an enabling technology for building large-scale infrastructures, integrating heterogeneous sensor, data and computational resources deployed over a wide area, to undertake complicated surveillance tasks such as environmental monitoring.

Activity recognition aims to recognize the actions and goals of one or more agents from a series of observations on the agents' actions and the environmental conditions. Since the 1980s, this research field has captured the attention of several computer science communities due to its strength in providing personalized support for many different applications and its connection to many different fields of study such as medicine, human-computer interaction, or sociology.

<span class="mw-page-title-main">Wearable technology</span> Clothing and accessories incorporating computer and advanced electronic technologies

Wearable technology is any technology that is designed to be used while worn. Common types of wearable technology include smartwatches and smartglasses. Wearable electronic devices are often close to or on the surface of the skin, where they detect, analyze, and transmit information such as vital signs, and/or ambient data and which allow in some cases immediate biofeedback to the wearer.

Urban computing is an interdisciplinary field which pertains to the study and application of computing technology in urban areas. This involves the application of wireless networks, sensors, computational power, and data to improve the quality of densely populated areas. Urban computing is the technological framework for smart cities.

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

Participatory sensing is the concept of communities contributing sensory information to form a body of knowledge.

A mobile form is an electronic or digital form application that functions on a smartphone or tablet device. Mobile forms enable users to collect data using mobile devices, and then to send the results back to the source. Mobile forms exist to replace paper forms as a more productive means of data collection, eliminating the need to transcribe or scan paper data results into a back office system.

Opportunistic mobile social networks are a form of mobile ad hoc networks that exploit the human social characteristics, such as similarities, daily routines, mobility patterns, and interests to perform the message routing and data sharing. In such networks, the users with mobile devices are able to form on-the-fly social networks to communicate with each other and share data objects.

Mobile phone–based sensing software is a class of software for mobile phones that uses the phone's sensors to acquire data about the user. Some applications of this software include mental health and overall wellness monitoring. This class of software is important because it has the potential of providing a practical and low-cost approach to deliver psychological interventions for the prevention of mental health disorders, as well as bringing such interventions to populations that have no access to traditional health care. A number of terms are used for this approach, including "personal sensing", "digital phenotyping", and "context sensing". The term "personal sensing" is used in this article, as it conveys in simple language the aim of sensing personal behaviors, states, and conditions.

Network eavesdropping, also known as eavesdropping attack, sniffing attack, or snooping attack, is a method that retrieves user information through the internet. This attack happens on electronic devices like computers and smartphones. This network attack typically happens under the usage of unsecured networks, such as public wifi connections or shared electronic devices. Eavesdropping attacks through the network is considered one of the most urgent threats in industries that rely on collecting and storing data. Internet users use eavesdropping via the Internet to improve information security.

References

  1. 1 2 3 4 5 6 7 8 Ganti, Raghu; Ye, Fan; Lei, Hui (2011). "Mobile crowdsensing: current state and future challenges". IEEE Communications Magazine. 49 (11): 32–39. doi:10.1109/MCOM.2011.6069707. S2CID   10228317.
  2. Wang, Yufeng; Ma, Jianhua (2014). Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective. Boca Raton, FL: CRC Press. p. 111. ISBN   9781466552753.
  3. 1 2 Pathan, Al-Sakib Khan (2018-09-03). Crowd Assisted Networking and Computing. CRC Press. ISBN   9780429843594.
  4. Xiong, H.; Zhang, D.; Chen, G.; Wang, L.; Gauthier, V.; Barnes, L. E. (August 2016). "iCrowd: Near-Optimal Task Allocation for Piggyback Crowdsensing". IEEE Transactions on Mobile Computing. 15 (8): 2010–2022. doi:10.1109/tmc.2015.2483505. ISSN   1536-1233. S2CID   14521123.
  5. Guo, Bin; Wang, Zhu; Yu, Zhiwen; Wang, Yu; Yen, Neil Y.; Huang, Runhe; Zhou, Xingshe (2015). "Mobile Crowd Sensing and Computing". ACM Computing Surveys. 48 (1): 1–31. doi:10.1145/2794400. S2CID   8610495.
  6. Nilanjan, Dey; Sharvari, Tamane (2018). Big Data Analytics for Smart and Connected Cities. Hershey, PA: IGI Global. p. 14. ISBN   9781522562078.
  7. Arkian, Hamid Reza; Diyanat, Abolfazl; Pourkhalili, Atefe (2017). "MIST: Fog-based Data Analytics Scheme with Cost-Efficient Resource Provisioning for IoT Crowdsensing Applications". Journal of Network and Computer Applications. 82: 152–165. doi:10.1016/j.jnca.2017.01.012.
  8. 1 2 3 Liu, Jinwei; Shen, Haiying; Zhang, Xiang (2016-08-01). "A Survey of Mobile Crowdsensing Techniques: A Critical Component for the Internet of Things". 2016 25th International Conference on Computer Communication and Networks (ICCCN). p. 1. doi:10.1109/ICCCN.2016.7568484. ISBN   978-1-5090-2279-3.
  9. Borcea, Cristian; Talasila, Manoop; Curtmola, Reza (2016). Mobile Crowdsensing. Boca Raton, FL: CRC Press. p. 47. ISBN   9781498738446.
  10. 1 2 Su, Hua; Wu, Qianqian; Sun, Xuemei; Zhang, Ning (2020-06-20). "The User Participation Incentive Mechanism of Mobile Crowdsensing Network Based on User Threshold". Discrete Dynamics in Nature and Society. 2020: 1–8. doi: 10.1155/2020/2683981 . ISSN   1026-0226.
  11. Bian, Jiang; Xiong, Haoyi; Fu, Yanjie; Das, Sajal K. (15 November 2017). "CSWA: Aggregation-Free Spatial-Temporal Community Sensing". arXiv: 1711.05712 [cs.LG].
  12. Guo, Bin; Yu, Zhiwen; Zhang, Daqing; Zhou, Xingshe (2014-01-14). "From Participatory Sensing to Mobile Crowd Sensing". arXiv: 1401.3090 [cs.HC].