I. Introduction
The proliferation of smartphones contributes to the prosperity of a novel sensing paradigm called Mobile Crowd Sensing (MCS) [1]–[7]. Different from traditional wireless sensor networks (WSNs) which usually leverage dedicated sensors to acquire real-world conditions, MCS utilizes off-the-shelf smartphones carried by citizens to capture dynamic changes of social and urban information. The participatory and mobile nature of MCS provides a novel way for the monitoring of environment, transportation, and city infrastructure [8]–[11]. Although promising, there is a big challenge to ensure the data quality in MCS, as it is susceptible to different kinds of attacks, faults, severe communication and system conditions:
Attack during transmission. With the transmissions over wireless networks, MCS data are subject to attacks such as eavesdropping, information tampering and malicious programs.
Attack by intelligent participation. MCS involves human participation. Intelligent attackers can introduce bad data into certain state variables, exploiting the knowledge of the MCS application configurations to bypass existing techniques for detecting bad measurements. For example, to earn rewards, participants may submit fake data without performing the actual sensing task [12], or compromise the mobile devices to provide faulty sensor readings [13].
Failure of algorithms or sensors. Mobile devices that do not work in normal states may also provide false measurements.
Severe communication/system conditions. False measurements may be resulted from network congestion, node misbehavior, monitor failure, and unreliable wireless transmission channels.