Data Freshness Quality in Privacy-Enabled Mobile Crowdsensing: Design Aspects and Challenges
Abstract
:1. Introduction
- 1.
- Sensing network scale diversity. In an MCS system, the sensing tasks are flexible, and the sensing data amount and type requirements are different, which results in various sensing network scales. Specifically, the system network size is proportional to the number of intelligent terminals and the execution complexity of the sensing task. Hence, under various types of sensing networks, if we aim to improve the system timeliness and security performance, the question of how to model the relationships among task requester, service provider, and intelligent terminals could be the primary challenge.
- 2.
- Sensing task requirement heterogeneity. The differences in sensing abilities among intelligent terminals are huge, as the demands and constraints of intelligent sensing terminals are heterogeneous during the sensing and transmission processes. In detail, the wireless resources of intelligent terminals, including spectrum, energy, space, and power aspects, cannot meet the needs of the sensing task requirements. Given the heterogeneity between the sensing task’s demand and intelligent terminals’ constraints, the question of how to realize timely and secure wireless resource optimization could be another challenge.
- 3.
- Sensing environment openness. Due to the wide range of sources of MCS, the sensing environment is open to all potential intelligent sensing terminals, which increases the security risks [5]. For example, some malicious users may launch attacks on an MCS system, bringing threats in terms of sensing data content, sensing terminal identity and location information, and sensing task content or even causing the service provider cloud node to be paralyzed and disabled, unable to recruit terminals and assign sensing tasks. Therefore, the question of how to design privacy preservation schemes for different potential threats can also be challenging.
- 1.
- We systematically study the components, architecture, interactions, and privacy preservation issues for MCS. In addition, performance indicators and mathematical models for the AoI are also illustrated for the data freshness quality aspect of MCS.
- 2.
- We reveal the relationship between data freshness optimization and privacy preservation issues in MCS, where privacy preservation’s impact on data freshness optimization is investigated to cover the current research gap.
- 3.
- We give potential privacy preservation and data freshness optimization schemes for building secure and timely MCS, which can be implemented in different system layers.
- 4.
- We discuss the possible implementation and application for secure and timely MCS and list future directions in open issues.
2. Related Works on AoI and Privacy Efforts for MCS
3. Fundamentals and Design Aspects
3.1. Fundamentals
Mobile Crowdsensing
3.2. Design Aspects
3.2.1. Privacy Preservation for Mobile Crowdsensing
- 1.
- Sensing data content protection: Protecting the sensing data is significantly important. To save the implementation cost and sensing time during the data collection process, one might suffer from various issues (e.g., tempering). Without taking sensing data content protection measures, the sensing data can be easily forged, stolen, or tampered with, which will lead to unqualified and useless sensing data collection. Hence, it is of significance to realize and enable sensing data content protection [34].
- 2.
- Sensing task content protection: Protecting the sensing data is significantly important. To save the implementation cost and sensing time during the data collection process, one might suffer from various issues. For example, fewer sensors or less frequent sampling can lead to data incompleteness, and the usage of lower-cost sensors or less robust data collection methods can result in reduced accuracy. Therefore, without taking sensing data content protection measures, the sensing data can be easily forged, stolen, or tampered with, which will lead to unqualified and useless sensing data collection. Hence, it is of significance to realize and enable sensing data content protection [35].
- 3.
- Location and identity information protection: In some navigation or positioning-oriented scenarios, the MWs need to provide their own location and identification information to assist the object detection or location [36]. However, if the MWs’ location and identity information is not well protected, it will face the risk of being leaked or tampered with. On the one hand, modified location and identity information can lead to inaccurate or wrong navigation or positioning results. On the other hand, the MWs’ position and identity can be exposed to the public, which increases security risks. To provide better service and enhance individual service, the location and identity information of MWs should be protected.
3.2.2. Sensing Data Freshness Quality
- 1.
- Performance indicators: To accurately describe the data freshness performance of sensing data, an AoI indicator is proposed, which refers to the elapsed time for the latest successfully received packet from its generating time slot to its being-received time slot. Different from a latency performance metric, the AoI comprehensively takes the waiting time at the source node and queuing time at the destination node into consideration [37]. The basic performance indicators for AoI can be divided into three types: instant AoI (IAoI), average AoI (AAoI), and peak AoI (PAoI). Specifically, during the data packet transmission process, instant AoI focuses on the data freshness value at a random time slot, the average AoI value concentrates on the overall data freshness performance for all time slots, and peak average AoI pays attention to the worst data freshness performance (i.e., maximum AoI value) at each time slot.
- 2.
- Mathematical models: Using the queue theory and Markov process, the mathematical expression (i.e., as shown in Figure 3 and Figure 4) for the AoI metric can be derived in the closed form [8]. In detail, the instant AoI can be directly obtained by calculating the current time value minus the packet generation timestamp. As for the average AoI, when the AoI is modeled as a sawtooth function, it can be calculated as the area (i.e., enclosed by the function and the axis) divided by the time period. From the perspective of queue theory, the sensing data are the guest, and the wireless channel represents the server. At this time, the sum area can be divided into the sum system time and the waiting time, where queue theory can help calculate their values under different serving rules and queue models. Moreover, as far as the peak AoI is concerned, the Markov process can help describe the stochastic data packet arrivals, thus determining the maximum AoI value at each time slot.
4. Privacy Preservation for Mobile Crowdsensing
4.1. Security Model and Threat Classification
4.1.1. Security Model
4.1.2. Threat Classification
4.2. Privacy Threats in Data Interaction Steps
4.2.1. Privacy Threats in Task Assignment Stage
4.2.2. Privacy Threats in Data Evaluation Stage
4.2.3. Privacy Threats in Reward Payment Stage
4.2.4. Privacy Threats of Interaction Framework Design
4.3. Privacy Preservation in MCS
4.3.1. Data Encryption/Decryption
4.3.2. Data Perturbation
4.3.3. Data Restricted Releasing
4.3.4. Trust Framework
4.3.5. Blockchain Technology
4.4. Performance Evaluation for Privacy Preservation
4.4.1. Implementation Cost
4.4.2. Granularity of Privacy Preservation
4.4.3. Data Completeness Quality
5. Data Freshness Optimization for Privacy-Preserving Mobile Crowdsensing
5.1. Privacy Preservation Impact on Data Freshness Optimization
5.1.1. Communication Overhead Constraints
5.1.2. Freshness Optimization Constraints
5.1.3. Communication Covertness Constraint
5.1.4. Task-Participation-Level Constraint
5.1.5. Data Interaction Architecture Constraint
5.2. Data Freshness Optimization at Various Layers
5.2.1. Data Freshness Optimization at Perception Layer
5.2.2. Data Freshness Optimization at Link Layer
5.2.3. Data Freshness Optimization at Transmission Layer
5.3. Measures to Optimize Data Freshness
5.3.1. Resource Allocation
5.3.2. Coding Design
5.3.3. Access Control
6. Case Study: Traffic Management in Smart City
7. Future Works and Open Issues
7.1. Data Freshness Optimization in Mobile Crowdsensing Powered by Wireless Power Transfer
7.2. Data Freshness Optimization Based on Attention Mechanism in Large-Scale Mobile Crowdsensing
7.3. Generative Artificial Intelligence-Based Privacy Preservation in Mobile Crowdsensing
7.4. Blockchain-Based Solutions for Data Freshness Quality in Privacy-Enabled Mobile Crowdsensing
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Khan, L.U.; Guizani, M.; Niyato, D.; Al-Fuqaha, A.; Debbah, M. Metaverse for Wireless Systems: Architecture, Advances, Standardization, and Open Challenges. arXiv 2023, arXiv:2301.11441. [Google Scholar]
- Liu, H.; Xu, Z.; Wei, Y.; Han, K.; Peng, X. Multispectral non-line-of-sight imaging via deep fusion photography. Sci. China Inf. Sci. 2025, 68, 140407. [Google Scholar] [CrossRef]
- Zhang, T.; Kong, F.; Deng, D.; Tang, X.; Wu, X.; Xu, C.; Zhu, L.; Liu, J.; Ai, B.; Han, Z.; et al. Moving Target Defense Meets Artificial Intelligence-Driven Network: A Comprehensive Survey. IEEE Internet Things J. 2025. [Google Scholar] [CrossRef]
- Capponi, A.; Fiandrino, C.; Kantarci, B.; Foschini, L.; Kliazovich, D.; Bouvry, P. A survey on mobile crowdsensing systems: Challenges, solutions, and opportunities. IEEE Commun. Surv. Tutor. 2019, 21, 2419–2465. [Google Scholar]
- Jiang, J.; Liu, F.; Liu, Y.; Tang, Q.; Wang, B.; Zhong, G.; Wang, W. A dynamic ensemble algorithm for anomaly detection in IoT imbalanced data streams. Comput. Commun. 2022, 194, 250–257. [Google Scholar]
- Tahmasebian, F.; Xiong, L.; Sotoodeh, M.; Sunderam, V. Crowdsourcing under data poisoning attacks: A comparative study. In Data and Applications Security and Privacy XXXIV; Springer: Regensburg, Germany, 2020; pp. 310–332. [Google Scholar]
- Yu, B.; Cai, Y.; Diao, X.; Cheng, K. Adaptive Packet Length Adjustment for Minimizing Age of Information Over Fading Channels. IEEE Trans. Wirel. Commun. 2023, 22, 6641–6653. [Google Scholar]
- Yang, Y.; Wang, W.; Yin, Z.; Xu, R.; Zhou, X.; Kumar, N.; Alazab, M.; Gadekallu, T.R. Mixed game-based AoI optimization for combating COVID-19 with AI bots. IEEE J. Sel. Areas Commun. 2022, 40, 3122–3138. [Google Scholar]
- Yang, Y.; Wang, W.; Liu, L.; Dev, K.; Qureshi, N.M.F. AoI optimization in the UAV-aided traffic monitoring network under attack: A Stackelberg game viewpoint. IEEE Trans. Intell. Transp. Syst. 2022, 24, 932–941. [Google Scholar]
- Jiang, J.; Liu, F.; Ng, W.W.Y.; Tang, Q.; Zhong, G.; Tang, X.; Wang, B. AERF: Adaptive ensemble random fuzzy algorithm for anomaly detection in cloud computing. Comput. Commun. 2023, 200, 86–94. [Google Scholar]
- Qin, Z.; Ye, J.; Meng, J.; Lu, B.; Wang, L. Privacy-preserving blockchain-based federated learning for marine Internet of Things. IEEE Trans. Comput. Soc. Syst. 2021, 9, 159–173. [Google Scholar]
- Lim, W.Y.B.; Xiong, Z.; Kang, J.; Niyato, D.; Leung, C.; Miao, C.; Shen, X. When information freshness meets service latency in federated learning: A task-aware incentive scheme for smart industries. IEEE Trans. Ind. Inform. 2020, 18, 457–466. [Google Scholar] [CrossRef]
- Wang, W.; Yang, Y.; Yin, Z.; Dev, K.; Zhou, X.; Li, X.; Qureshi, N.M.F.; Su, C. BSIF: Blockchain-based secure, interactive, and fair mobile crowdsensing. IEEE J. Sel. Areas Commun. 2022, 40, 3452–3469. [Google Scholar]
- Yang, Y.; Zhang, B.; Guo, D.; Xu, R.; Kumar, N.; Wang, W. Mean Field Game and Broadcast Encryption-based Joint Data Freshness Optimization and Privacy Preservation for Mobile Crowdsensing. IEEE Trans. Veh. Technol. 2023, 72, 14860–14874. [Google Scholar]
- Wang, Y.; Yan, Z.; Feng, W.; Liu, S. Privacy protection in mobile crowd sensing: A survey. World Wide Web 2020, 23, 421–452. [Google Scholar] [CrossRef]
- Boubiche, D.E.; Imran, M.; Maqsood, A.; Shoaib, M. Mobile crowd sensing—Taxonomy, applications, challenges, and solutions. Comput. Hum. Behav. 2019, 101, 352–370. [Google Scholar] [CrossRef]
- Ray, A.; Chowdhury, C.; Bhattacharya, S.; Roy, S. A survey of mobile crowdsensing and crowdsourcing strategies for smart mobile device users. CCF Trans. Pervasive Comput. Interact. 2023, 5, 98–123. [Google Scholar]
- Liu, Y.; Kong, L.; Chen, G. Data-oriented mobile crowdsensing: A comprehensive survey. IEEE Commun. Surv. Tutor. 2019, 21, 2849–2885. [Google Scholar]
- Khan, F.; Rehman, A.U.; Zheng, J.; Jan, M.A.; Alam, M. Mobile crowdsensing: A survey on privacy-preservation, task management, assignment models, and incentives mechanisms. Future Gener. Comput. Syst. 2019, 100, 456–472. [Google Scholar]
- Fu, L.; Zhao, Z.; Min, G.; Miao, W.; Zhao, L.; Huang, W. Energy-Efficient 3D Data Collection for Multi-UAV Assisted Mobile Crowdsensing. IEEE Trans. Comput. 2022, 72, 2025–2038. [Google Scholar]
- Yang, G.; Wen, P.; Liu, Y.; Kong, L.; Liu, Y. Spatial-Temporal Data Inference with Graph Attention Neural Networks in Sparse Mobile Crowdsensing. IEEE Trans. Netw. Sci. Eng. 2024, 11, 4617–4626. [Google Scholar] [CrossRef]
- Wang, P.; Yu, Z.; Lin, C.; Yang, L.; Hou, Y.; Zhang, Q. D2D-enabled Reliable Data Collection for Mobile Crowdsensing. In Proceedings of the 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), Hong Kong, China, 2–4 December 2020; pp. 180–187. [Google Scholar]
- Liu, X.; Chen, H.; Liu, Y.; Wei, W.; Xue, H.; Xia, F. Multi-Task Data Collection with Limited Budget in Edge-assisted Mobile Crowdsensing. IEEE Internet Things J. 2024, 11, 16845–16858. [Google Scholar]
- Niu, X.; Huang, H.; Li, Y. A Real-time Data Collection Mechanism with Trajectory Privacy in Mobile Crowdsensing. IEEE Commun. Lett. 2020, 24, 2114–2118. [Google Scholar] [CrossRef]
- Li, F.; Song, H.; Li, J. Personalized Data Collection Based on Local Differential Privacy in the Mobile Crowdsensing. In Proceedings of the 2020 IEEE 6th International Conference on Computer and Communications (ICCC), Chengdu, China, 11–14 December 2020; pp. 2048–2052. [Google Scholar]
- Surendran, D.; Sasikala, K. A Scheduling Genetic Algorithm For Real-Time Data Freshness And Cloud Data Security over Keywords Searching. Int. J. Comput. Inf. Syst. (IJCIS) 2022, 3, 111–120. [Google Scholar]
- Yang, Y.; Zhang, B.; Guo, D.; Xu, R.; Dev, K.; Wang, W. Joint data freshness optimization and privacy preservation in mobile crowdsensing. In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 510–515. [Google Scholar]
- Maheswari, P.; Sindhumathi, B. AFS: Privacy-preserving public auditing with data freshness in the cloud. IOSR J. Comput. Eng. (IOSRJCE) 2014, 7, 56–63. [Google Scholar]
- Trueman, T.E.; Narayanasamy, P. Ensuring privacy and data freshness for public auditing of shared data in cloud. In Proceedings of the 2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM), Bangalore, India, 25–27 November 2015; pp. 22–27. [Google Scholar]
- Jin, H.; Zhou, K.; Jiang, H.; Lei, D.; Wei, R.; Li, C. Full integrity and freshness for cloud data. Future Gener. Comput. Syst. 2018, 80, 640–652. [Google Scholar]
- Yang, Y.; Zhang, B.; Guo, D.; Xiong, Z.; Niyato, D.; Han, Z. Can We Realize Data Freshness Optimization for Privacy Preserving-Mobile Crowdsensing With Artificial Noise? IEEE Trans. Mob. Comput. 2024, 23, 11357–11374. [Google Scholar]
- Wang, W.; Yang, Y.; Xiong, Z.; Niyato, D. Footstone of Metaverse: A Timely and Secure Crowdsensing. IEEE Netw. 2024, 38, 171–178. [Google Scholar]
- Yang, Y.; Zhang, B.; Guo, D.; Xu, R.; Su, C.; Wang, W. Age of Information Optimization for Privacy-preserving Mobile Crowdsensing. IEEE Trans. Emerg. Top. Comput. 2024, 12, 281–292. [Google Scholar]
- Wu, D.; Si, S.; Wu, S.; Wang, R. Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet Things J. 2017, 5, 2958–2970. [Google Scholar] [CrossRef]
- Gisdakis, S.; Giannetsos, T.; Papadimitratos, P. Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J. 2016, 3, 839–853. [Google Scholar]
- Wang, J.; Du, H.; Niyato, D.; Zhou, M.; Kang, J.; Xiong, Z.; Jamalipour, A. Through the wall detection and localization of autonomous mobile device in indoor scenario. IEEE J. Sel. Areas Commun. 2023, 42, 161–176. [Google Scholar]
- Kaul, S.; Yates, R.; Gruteser, M. Real-time status: How often should one update? In Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2731–2735. [Google Scholar]
- Zhang, C.; Wu, T.; Zhang, W. Data Privacy and Cybersecurity in Mobile Crowdsensing. Electronics 2025, 14, 1038. [Google Scholar] [CrossRef]
- Wu, D.; Yang, Z.; Yang, B.; Wang, R.; Zhang, P. From centralized management to edge collaboration: A privacy-preserving task assignment framework for mobile crowdsensing. IEEE Internet Things J. 2020, 8, 4579–4589. [Google Scholar]
- He, D.; Chan, S.; Guizani, M. User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel. Commun. 2015, 22, 28–34. [Google Scholar]
- Liu, Y.; Wang, H.; Peng, M.; Guan, J.; Wang, Y. An incentive mechanism for privacy-preserving crowdsensing via deep reinforcement learning. IEEE Internet Things J. 2020, 8, 8616–8631. [Google Scholar]
- Han, X.; Niu, X.; Chen, L.; Qin, S. Privacy protection strategies in mobile crowdsensing from the framework perspective. In Proceedings of the 2024 29th International Conference on Automation and Computing (ICAC), Sunderland, UK, 28–30 August 2024; pp. 1–6. [Google Scholar]
- Owoh, N.P.; Singh, M.M. Security analysis of mobile crowd sensing applications. Appl. Comput. Inform. 2022, 18, 2–21. [Google Scholar]
- Wang, L.; Zhang, D.; Yang, D.; Lim, B.Y.; Han, X.; Ma, X. Sparse mobile crowdsensing with differential and distortion location privacy. IEEE Trans. Inf. Forensics Secur. 2020, 15, 2735–2749. [Google Scholar]
- Zheng, Y.; Zhou, M.; Wang, S.; Huang, H.; Jia, X.; Yi, X.; Wang, C. SecDR: Enabling secure, efficient, and accurate data recovery for mobile crowdsensing. IEEE Trans. Dependable Secur. Comput. 2023, 21, 789–803. [Google Scholar]
- Li, X.; Zhang, T.; Wang, J.; Han, Z.; Liu, J.; Kang, J.; Niyato, D.; Jamalipour, A. Achieving Network Resilience through Graph Neural Network-enabled Deep Reinforcement Learning. IEEE Netw. 2025. [Google Scholar] [CrossRef]
- Yang, Y.; Zhang, B.; Guo, D.; Wang, W.; Li, X.; Hu, C. PPFO: A privacy preservation-oriented data freshness optimization framework for mobile crowdsensing. IEEE Commun. Stand. Mag. 2023, 7, 34–40. [Google Scholar]
- Zhang, X.; Jiang, L.; Wang, X. Incentive mechanisms for mobile crowdsensing with heterogeneous sensing costs. IEEE Trans. Veh. Technol. 2019, 68, 3992–4002. [Google Scholar]
- Kim, B.D.; Vasudevan, V.A.; Woo, J.; Cohen, A.; D’Oliveira, R.G.L.; Stahlbuhk, T.; Médard, M. CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation. In Proceedings of the ICASSP 2024—2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Seoul, Republic of Korea, 14–19 April 2024; pp. 4820–4824. [Google Scholar]
- Kim, J.W.; Edemacu, K.; Jang, B. Privacy-preserving mechanisms for location privacy in mobile crowdsensing: A survey. J. Netw. Comput. Appl. 2022, 200, 103315. [Google Scholar]
- Azhar, S.; Chang, S.; Liu, Y.; Tao, Y.; Liu, G. Privacy-preserving and utility-aware participant selection for mobile crowd sensing. Mob. Netw. Appl. 2022, 27, 290–302. [Google Scholar]
- Wang, J.; Wang, L.; Wang, Y.; Zhang, D.; Kong, L. Task allocation in mobile crowd sensing: State-of-the-art and future opportunities. IEEE Internet Things J. 2018, 5, 3747–3757. [Google Scholar]
- Hu, X.; Li, X.; Ngai, E.C.H.; Leung, V.C.M.; Kruchten, P. Multidimensional context-aware social network architecture for mobile crowdsensing. IEEE Commun. Mag. 2014, 52, 78–87. [Google Scholar]
- Zhu, X.; Liu, J.; Lu, L.; Zhang, T.; Qiu, T.; Wang, C.; Liu, Y. Enabling Intelligent Connectivity: A Survey of Secure ISAC in 6G Networks. IEEE Commun. Surv. Tutor. 2024. [Google Scholar] [CrossRef]
- Dai, Z.; Liu, C.H.; Han, R.; Wang, G.; Leung, K.K.; Tang, J. Delay-sensitive energy-efficient UAV crowdsensing by deep reinforcement learning. IEEE Trans. Mob. Comput. 2021, 22, 2038–2052. [Google Scholar]
- Yang, Y.; Du, H.; Xiong, Z.; Niyato, D.; Jamalipour, A.; Han, Z. Enhancing wireless networks with attention mechanisms: Insights from mobile crowdsensing. arXiv 2024, arXiv:2407.15483. [Google Scholar]
- Zhang, W.; He, Y.; Zhang, T.; Ying, C.; Kang, J. Intelligent Resource Adaptation for Diversified Service Requirements in Industrial IoT. IEEE Trans. Cogn. Commun. Netw. 2024. [Google Scholar] [CrossRef]
- Yang, Y.; Du, H.; Xiong, Z.; Xu, R.; Niyato, D.; Han, Z. Exploring Impacts of Age of Information on Data Accuracy for Wireless Sensing Systems: An Information Entropy Perspective. IEEE Trans. Mob. Comput. 2025. [Google Scholar] [CrossRef]
- Rakhmanov, A.; Wiseman, Y. Compression of GNSS data with the aim of speeding up communication to autonomous vehicles. Remote Sens. 2023, 15, 2165. [Google Scholar] [CrossRef]
- Yang, Y.; Chen, Y.; Wang, J.; Sun, G.; Niyato, D. Embodied AI-empowered Low Altitude Economy: Integrated Sensing, Communications, Computation, and Control (ISC3). arXiv 2024, arXiv:2412.19996. [Google Scholar]
- Maitra, T.; Obaidat, M.S.; Giri, D.; Dutta, S.; Dahal, K. ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications. IET Netw. 2019, 8, 289–298. [Google Scholar] [CrossRef]
- Hussein, H.I.; Abduallah, W.M. An efficient ElGamal cryptosystem scheme. Int. J. Comput. Appl. 2021, 43, 1088–1094. [Google Scholar] [CrossRef]
- Wang, J.; Du, H.; Liu, Y.; Sun, G.; Niyato, D.; Mao, S.; Kim, D.I.; Shen, X. Generative AI based Secure Wireless Sensing for ISAC Networks. arXiv 2024, arXiv:2408.11398. [Google Scholar]
- Wang, J.; Du, H.; Niyato, D.; Kang, J.; Cui, S.; Shen, X.S.; Zhang, P. Generative AI for integrated sensing and communication: Insights from the physical layer perspective. IEEE Wirel. Commun. 2024, 31, 246–255. [Google Scholar] [CrossRef]
- Yang, Y.; Du, H.; Sun, G.; Xiong, Z.; Niyato, D.; Han, Z. Exploring Equilibrium Strategies in Network Games with Generative AI. IEEE Netw. 2024. [Google Scholar] [CrossRef]
- Liu, Y.; Zhao, Y. A blockchain-enabled Framework for Vehicular Data sensing: Enhancing information freshness. IEEE Trans. Veh. Technol. 2024, 73, 17416–17429. [Google Scholar] [CrossRef]
- Ying, C.; Hai, J.; Li, J.; Si, X.; Luo, Y. Incentive mechanism design via smart contract in blockchain-based edge-assisted crowdsensing. Front. Comput. Sci. 2025, 19, 193802. [Google Scholar] [CrossRef]
Symbol | Meaning |
---|---|
The instant AoI | |
The average AoI | |
The generation rate of the sensing data | |
The utilization rate of the wireless channel | |
The transmission rate of the wireless channel | |
The expectation operation | |
Q | The elapsed time for updating two adjacent sensing data |
K | The difference of current sensing data’s received time slot and generated time slot |
The Lambert-W function | |
The average AoI in M/M/1 model under FCFS serving rule | |
The average AoI in M/D/1 model under FCFS serving rule | |
The average AoI in D/M/1 model under FCFS serving rule | |
The average AoI in M/M/1 model under LCFS serving rule | |
The average AoI in M/D/1 model under LCFS serving rule | |
The average AoI in D/M/1 model under LCFS serving rule | |
The privacy budget of the difference privacy technique | |
The failure probability of the difference privacy guarantee | |
t | The sensing data’s generated timestamp |
The sensing data’s successfully received timestamp |
Acronym | Full Name |
---|---|
AAoI | Average AoI |
AI | Artificial intelligence |
AoI | Age of Information |
DP | Dynamic programming |
DT | Digital twin |
FCFS | First come first served |
GD | Gradient descent |
IAoI | Instant AoI |
LCFS | Last come first served |
LD | Linear programming |
MCS | Mobile crowdsensing |
MW | Mobile worker |
PAoI | Peak AoI |
SINR | Signal-to-interference plus noise ratio |
SMC | Secure multi-party computation |
SP | Service provider |
SR | Service requester |
TPSVS | Third-Party Secure Verification System |
UAV | Unmanned aerial vehicle |
WPT | Wireless power transfer |
WSN | Wireless sensing network |
Reference | Focus Issues | Privacy Security | Data Freshness |
---|---|---|---|
[4] | Taxonomies and classification of different layers of MCS | Not considered | Considered |
[16] | Architectures and applications for MCS | Not considered | Considered |
[17] | Implementation and differences between MCS and mobile sourcing | Not considered | Considered |
[18] | Data collection, analysis, and application for MCS | Not considered | Considered |
[15] | Privacy threats and schemes for MCS | Not considered | Considered |
[19] | Privacy preservation, task management, assignment models, and incentive mechanisms for MCS | Not considered | Considered |
[20] | System energy and data timeliness | Not considered | Considered |
[21] | Data reconstruction accuracy | Not considered | Not considered |
[22] | Data reliability and quality | Considered | Not considered |
[23] | Data collection time and quality | Not considered | Considered |
[24] | Terminal trajectory privacy protection | Considered | Not considered |
[25] | Terminal privacy and data utility | Considered | Not considered |
[26] | Real-time data freshness and cloud data | Considered | Considered |
[27] | Data freshness and privacy preservation | Considered | Considered |
[28] | Data freshness and privacy-preserving public auditing | Considered | Considered |
[29] | Data freshness and public auditing | Considered | Considered |
[30] | Data freshness and privacy preservation | Considered | Considered |
[31] | Terminal privacy and data utility | Considered | Considered |
This work | Data freshness quality for privacy-preserving MCS | Considered | Considered |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chen, S.; Chen, Z.; Chen, Y.; Shen, Y.; Liu, G.; Chen, Y. Data Freshness Quality in Privacy-Enabled Mobile Crowdsensing: Design Aspects and Challenges. Electronics 2025, 14, 1365. https://doi.org/10.3390/electronics14071365
Chen S, Chen Z, Chen Y, Shen Y, Liu G, Chen Y. Data Freshness Quality in Privacy-Enabled Mobile Crowdsensing: Design Aspects and Challenges. Electronics. 2025; 14(7):1365. https://doi.org/10.3390/electronics14071365
Chicago/Turabian StyleChen, Shengzhan, Zhengpeng Chen, Yong Chen, Ying Shen, Guangyuan Liu, and Yanru Chen. 2025. "Data Freshness Quality in Privacy-Enabled Mobile Crowdsensing: Design Aspects and Challenges" Electronics 14, no. 7: 1365. https://doi.org/10.3390/electronics14071365
APA StyleChen, S., Chen, Z., Chen, Y., Shen, Y., Liu, G., & Chen, Y. (2025). Data Freshness Quality in Privacy-Enabled Mobile Crowdsensing: Design Aspects and Challenges. Electronics, 14(7), 1365. https://doi.org/10.3390/electronics14071365