Skip to main content
Log in

Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Crowdsourcing can be a powerful weapon against cyberattacks in 5G networks. In this paper we analyse this idea in detail, starting with the use cases in crowdsourcing focused on security, and highlighting those areas of a 5G ecosystem where crowdsourcing could be used to mitigate local and remote attacks, as well as to discourage criminal activities and cybercriminal behaviour. We pay particular attention to the capillary network, where an infinite number of IoT objects coexist. The analysis considers the different participants in a 5G IoT ecosystem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Belmonte Martin A, Marinos L, Rekleitis E, Spanoudakis G, Petroulakis N (2015) Threat landscape and good practice guide for software defined networks/5g. European Union Agency for Network and Information Security (ENISA)

  2. Chon KHS (2016) Cybercrime precursors: towards a model of offender resources. PhD Thesis. Australian National University

  3. de Fuentes JM, González-Manzano L, Gonzalez-Tablas AI, Blasco J (2013) Wevan–a mechanism for evidence creation and verification in vanets. J Syst Archit 59(10):985–995

    Article  Google Scholar 

  4. Dohler M, Nakamura T (2016) 5G mobile and wireless communications technology. Cambridge University Press, Cambridge

    Google Scholar 

  5. Gao H, Barbier G, Goolsby R (2011) Harnessing the crowdsourcing power of social media for disaster relief. IEEE Intell Syst 26(3):10–14

    Article  Google Scholar 

  6. Hanslovan K (2017) Proud moment: Wannacry collaboration. https://medium.com/@KyleHanslovan/proud-moment-wannacry-collaboration-e1f6fafe76dc

  7. Howe J (2006) The rise of crowdsourcing. Wired Mag 14(6):1–4

    Google Scholar 

  8. Luxembourg TCIRC (2017) Cirl misp threat sharing. https://www.circl.lu/services/misp-malware-information-sharing-platform/

  9. Micro T (2016) Flocker mobile ransomware crosses to smart tv. http://blog.trendmicro.com/trendlabs-security-intelligence/flocker-ransomware-crosses-smart-tv/

  10. Monahan T, Mokos JT (2013) Crowdsourcing urban surveillance: the development of homeland security markets for environmental sensor networks. Geoforum 49:279–288

    Article  Google Scholar 

  11. Nieto A, Roman R, Lopez J (2016) Digital witness: safeguarding digital evidence by using secure architectures in personal devices. IEEE Netw 30(6):34–41

    Article  Google Scholar 

  12. Nieto A, Rios R, Lopez J (2018) IoT-forensics meets privacy: towards cooperative digital investigations, vol 18. 492

  13. Nomikos N, Nieto A, Makris P, Skoutas DN, Vouyioukas D, Rizomiliotis P, Lopez J, Skianis C (2015) Relay selection for secure 5g green communications. Telecommun Syst 59(1):169–187

    Article  Google Scholar 

  14. Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: enablers, architecture, and business models. IEEE J Sel Areas Commun 34(3):510–527

    Article  Google Scholar 

  15. Ratasuk R, Prasad A, Li Z, Ghosh A, Uusitalo MA (2015) Recent advancements in m2m communications in 4g networks and evolution towards 5g. In: 18th international conference on intelligence in next generation networks (ICIN). IEEE, pp 52–57

  16. Wagner C, Dulaunoy A, Wagener G, Iklody A (2016) Misp: the design and implementation of a collaborative threat intelligence sharing platform. In: Proceedings of the 2016 ACM on workshop on information sharing and collaborative security. ACM, pp 49–56

  17. Xu Z, Zhang H, Hu C, Mei L, Xuan J, Choo KKR, Sugumaran V, Zhu Y (2016) Building knowledge base of urban emergency events based on crowdsourcing of social media. Concurr Comput: Pract Exp 28 (15):4038–4052

    Article  Google Scholar 

  18. Xu L, Collier R, O’Hare GMP (2017) A survey of clustering techniques in wsns and consideration of the challenges of applying such to 5g iot scenarios. IEEE Internet of Things J PP(99):1–1. https://doi.org/10.1109/JIOT.2017.2726014

    Google Scholar 

  19. Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Di Renzo M (2015) Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27

    Article  Google Scholar 

Download references

Acknowledgments

This work has been partially funded by the Spanish Ministry of Economy and Competitiveness through the projects IoTest (TIN2015-72634-EXP /AEI) and SMOG (TIN2016-79095-C2-1-R).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ana Nieto.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nieto, A., Acien, A. & Fernandez, G. Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation. Mobile Netw Appl 24, 881–889 (2019). https://doi.org/10.1007/s11036-018-1146-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1146-4

Keywords

Navigation