Crowdsensing, sometimes referred to as mobile crowdsensing, is a technique where a large group of individuals having mobile devices capable of sensing and computing (such as smartphones, tablet computers, wearables) collectively share data and extract information to measure, map, analyze, estimate or infer (predict) any processes of common interest. In short, this means crowdsourcing of sensor data from mobile devices.
Devices equipped with various sensors have become ubiquitous. Most smartphones can sense ambient light, noise (through the microphone), location (through the GPS), movement (through the accelerometer), and more. These sensors can collect vast quantities of data that are useful in a variety of ways. For example, GPS and accelerometer data can be used to locate potholes in cities, and microphones can be used with GPS to map noise pollution.
The term "mobile crowdsensing" was coined by Raghu Ganti, Fan Ye, and Hui Lei in 2011. Mobile crowdsensing belongs to three main types: environmental (such as monitoring pollution), infrastructure (such as locating potholes), and social (such as tracking exercise data within a community). Current crowdsensing applications operate based on the assumption that all users voluntarily submit the sensing data leading to extensive user participation.[1] It can also indicate the way mobile device users form microcrowds based on a specific crowdsensing activity.[2]
Based on the type of involvement from the users, mobile crowdsensing can be classified into two types:
Taking advantage of the ubiquitous presence of powerful mobile computing devices (especially smartphones) in recent years, it has become an appealing method to businesses that wish to collect data without making large-scale investments. Numerous technology companies use this technique to offer services based on the big data collected, some of the most notable examples being Facebook, Google, and Uber.
Mobile crowdsensing occurs in three stages: data collection, data storage, and data upload.[6]
Data collection draws on sensors available through the Internet of things.[7] There are three main strategies for collecting this data:[8]
The data collection phase can also involve a process called deduplication, which involves removing redundant information from a data set to lower costs and improve user experience. The deduplication process filters and compresses the data that has been collected before it gets uploaded.
The second stage involves the storage of data in the user's device until it gets another user to share and communicate. For instance, videos monitoring an activity (e.g. traffic) may be stored on a user's device for a specific period and are then transmitted to a person or institution capable of taking action.[9]
An example of mobile crowdsensing is when mobile phone users activate the mobile sensor, including Google Maps and Snapchat that collect and share local information to the internet.[10] The app retrieves information such as location, birthday, gender, and more.
Mobile crowdsensing potential is limited by constraints involving energy, bandwidth, and computation power. Using the GPS, for example, drains batteries, but location can also be tracked using Wi-Fi and GSM, although these are less accurate. Eliminating redundant data can also reduce energy and bandwidth costs, as can restricting data sensing when quality is unlikely to be high (e.g., when two photos are taken in the same location, the second is unlikely to provide new information).
The data collected through mobile crowdsensing can be sensitive to individuals, revealing personal information such as home and work locations and the routes used when commuting between the two. Ensuring the privacy and security of personal information collected through mobile crowdsensing is therefore important.
Mobile crowdsensing can use three main methods to protect privacy:
Data integrity can also be a problem when using mobile crowdsensing, especially when the program is opt in; in these situations, people can either unintentionally or maliciously contribute false data.[12] Protecting data integrity can involve filtering, quality estimation, etc. Other solutions include installing collocated infrastructure to act as a witness or by using trusted hardware that is already installed on smartphones. However, both of these methods can be expensive or energy intensive.