Abstract
Crowdsourcing can be a powerful weapon against cyberattacks in 5G networks. In this paper we analyse this idea in detail, starting with the use cases in crowdsourcing focused on security, and highlighting those areas of a 5G ecosystem where crowdsourcing could be used to mitigate local and remote attacks, as well as to discourage criminal activities and cybercriminal behaviour. We pay particular attention to the capillary network, where an infinite number of IoT objects coexist. The analysis considers the different participants in a 5G IoT ecosystem.
Similar content being viewed by others
References
Belmonte Martin A, Marinos L, Rekleitis E, Spanoudakis G, Petroulakis N (2015) Threat landscape and good practice guide for software defined networks/5g. European Union Agency for Network and Information Security (ENISA)
Chon KHS (2016) Cybercrime precursors: towards a model of offender resources. PhD Thesis. Australian National University
de Fuentes JM, González-Manzano L, Gonzalez-Tablas AI, Blasco J (2013) Wevan–a mechanism for evidence creation and verification in vanets. J Syst Archit 59(10):985–995
Dohler M, Nakamura T (2016) 5G mobile and wireless communications technology. Cambridge University Press, Cambridge
Gao H, Barbier G, Goolsby R (2011) Harnessing the crowdsourcing power of social media for disaster relief. IEEE Intell Syst 26(3):10–14
Hanslovan K (2017) Proud moment: Wannacry collaboration. https://medium.com/@KyleHanslovan/proud-moment-wannacry-collaboration-e1f6fafe76dc
Howe J (2006) The rise of crowdsourcing. Wired Mag 14(6):1–4
Luxembourg TCIRC (2017) Cirl misp threat sharing. https://www.circl.lu/services/misp-malware-information-sharing-platform/
Micro T (2016) Flocker mobile ransomware crosses to smart tv. http://blog.trendmicro.com/trendlabs-security-intelligence/flocker-ransomware-crosses-smart-tv/
Monahan T, Mokos JT (2013) Crowdsourcing urban surveillance: the development of homeland security markets for environmental sensor networks. Geoforum 49:279–288
Nieto A, Roman R, Lopez J (2016) Digital witness: safeguarding digital evidence by using secure architectures in personal devices. IEEE Netw 30(6):34–41
Nieto A, Rios R, Lopez J (2018) IoT-forensics meets privacy: towards cooperative digital investigations, vol 18. 492
Nomikos N, Nieto A, Makris P, Skoutas DN, Vouyioukas D, Rizomiliotis P, Lopez J, Skianis C (2015) Relay selection for secure 5g green communications. Telecommun Syst 59(1):169–187
Palattella MR, Dohler M, Grieco A, Rizzo G, Torsner J, Engel T, Ladid L (2016) Internet of things in the 5g era: enablers, architecture, and business models. IEEE J Sel Areas Commun 34(3):510–527
Ratasuk R, Prasad A, Li Z, Ghosh A, Uusitalo MA (2015) Recent advancements in m2m communications in 4g networks and evolution towards 5g. In: 18th international conference on intelligence in next generation networks (ICIN). IEEE, pp 52–57
Wagner C, Dulaunoy A, Wagener G, Iklody A (2016) Misp: the design and implementation of a collaborative threat intelligence sharing platform. In: Proceedings of the 2016 ACM on workshop on information sharing and collaborative security. ACM, pp 49–56
Xu Z, Zhang H, Hu C, Mei L, Xuan J, Choo KKR, Sugumaran V, Zhu Y (2016) Building knowledge base of urban emergency events based on crowdsourcing of social media. Concurr Comput: Pract Exp 28 (15):4038–4052
Xu L, Collier R, O’Hare GMP (2017) A survey of clustering techniques in wsns and consideration of the challenges of applying such to 5g iot scenarios. IEEE Internet of Things J PP(99):1–1. https://doi.org/10.1109/JIOT.2017.2726014
Yang N, Wang L, Geraci G, Elkashlan M, Yuan J, Di Renzo M (2015) Safeguarding 5g wireless communication networks using physical layer security. IEEE Commun Mag 53(4):20–27
Acknowledgments
This work has been partially funded by the Spanish Ministry of Economy and Competitiveness through the projects IoTest (TIN2015-72634-EXP /AEI) and SMOG (TIN2016-79095-C2-1-R).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Nieto, A., Acien, A. & Fernandez, G. Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation. Mobile Netw Appl 24, 881–889 (2019). https://doi.org/10.1007/s11036-018-1146-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1146-4