Skip to main content

REVIEW article

Front. Commun. Netw.

Sec. Security, Privacy and Authentication

Volume 6 - 2025 | doi: 10.3389/frcmn.2025.1443592

This article is part of the Research Topic Emerging Technologies, Challenges and Solutions for Zero Trust View all articles

Enhancing Security of Mobile Crowd Sensing in Unmanned Areal Vehicle Ecosystems

Provisionally accepted
Sara Sumaidaa Sara Sumaidaa *Hamda Almenhali Hamda Almenhali Mohammed Alazzani Mohammed Alazzani Kyusuk Han Kyusuk Han *
  • Technology Innovation Institute (TII), Masdar City, United Arab Emirates

The final, formatted version of the article will be published soon.

    The rapid expansion of mobile devices with enhanced sensing and computing capabilities has driven the growth of Mobile Crowd Sensing (MCS), enabling applications that collect large datasets from sources like smartphones and smartwatches. However, this data aggregation raises substantial security and privacy concerns, especially when MCS integrates with unmanned aerial vehicles (UAVs), where potential risks are further amplified. This study identifies and analyzes specific security and privacy threats in UAV-based MCS through the framework of the CIA triad (Confidentiality, Integrity, and Availability). We categorize potential vulnerabilities and propose comprehensive countermeasures targeting hardware, software, and communication models. Our findings outline strategic and actionable countermeasures to mitigate identified risks, thus ensuring data integrity and reliable functionality within MCS systems. Additionally, we present a security scenario involving mitigation suggested for data integrity and recovery. This work underscores the critical need for robust security frameworks in UAV-enhanced MCS applications, offering a holistic approach to mitigate emerging security threats.

    Keywords: Crowd sensing, Mobile crowd sensing, UAV, Drone, security, Threat analysis

    Received: 04 Jun 2024; Accepted: 06 Feb 2025.

    Copyright: © 2025 Sumaidaa, Almenhali, Alazzani and Han. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence:
    Sara Sumaidaa, Technology Innovation Institute (TII), Masdar City, United Arab Emirates
    Kyusuk Han, Technology Innovation Institute (TII), Masdar City, United Arab Emirates

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

    Research integrity at Frontiers

    Man ultramarathon runner in the mountains he trains at sunset

    94% of researchers rate our articles as excellent or good

    Learn more about the work of our research integrity team to safeguard the quality of each article we publish.


    Find out more