Non-Cooperative Location Privacy

被引:50
|
作者
Freudiger, Julien [1 ]
Manshaei, Mohammad Hossein [2 ]
Hubaux, Jean-Pierre [1 ]
Parkes, David C. [3 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Stn 14, CH-1015 Lausanne, Switzerland
[2] Isfahan Univ Technol, Dept Elect & Comp Engn, Esfahan 8415683111, Iran
[3] Harvard Univ, Sch Engn & Appl Sci, Maxwell Dworkin, Cambridge, MA 02138 USA
关键词
Security and privacy protection; mobile computing; network protocols;
D O I
10.1109/TDSC.2012.85
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. Self-interested mobile nodes might, thus, decide not to cooperate and jeopardize the achievable location privacy. In this paper, we analyze non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. We obtain Nash equilibria in static n-player complete information games. As in practice mobile nodes do not know their opponents' payoffs, we then consider static incomplete information games. We establish that symmetric Bayesian-Nash equilibria exist with simple threshold strategies. By means of numerical results, we predict behavior of selfish mobile nodes. We then investigate dynamic games where players decide to change their pseudonym one after the other and show how this affects strategies at equilibrium. Finally, we design protocols-PseudoGame protocols-based on the results of our analysis and simulate their performance in vehicular network scenarios.
引用
收藏
页码:84 / 98
页数:15
相关论文
共 50 条
  • [1] On Non-Cooperative Location Privacy: A Game-Theoretic Analysis
    Freudiger, Julien
    Manshaei, Mohammad Hossein
    Hubaux, Jean-Pierre
    Parkes, David C.
    [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 324 - 337
  • [2] On Non-cooperative Genomic Privacy
    Humbert, Mathias
    Ayday, Erman
    Hubaux, Jean-Pierre
    Telenti, Amalio
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 407 - 426
  • [3] Non-cooperative facility location and covering games
    Cardinal, Jean
    Hoefer, Martin
    [J]. THEORETICAL COMPUTER SCIENCE, 2010, 411 (16-18) : 1855 - 1876
  • [4] Non-cooperative facility location and covering games
    Hoefer, Martin
    [J]. ALGORITHMS AND COMPUTATION, PROCEEDINGS, 2006, 4288 : 369 - 378
  • [5] Non-cooperative capacitated facility location games
    Rodrigues, Felix Carvalho
    Xavier, Eduardo Candido
    [J]. INFORMATION PROCESSING LETTERS, 2017, 117 : 45 - 53
  • [6] Non-cooperative multicast and facility location games
    Chekuri, Chandra
    Chuzhoy, Julia
    Lewin-Eytan, Liane
    Naor, Joseph
    Orda, Ariel
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2007, 25 (06) : 1193 - 1206
  • [7] A Hardware Platform for Non-cooperative UAV Detection and Location
    Yao, Shunyu
    Meng, Qian
    Zhou, Chenye
    [J]. 2022 11TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS (ICCCAS 2022), 2022, : 55 - 58
  • [8] Privacy-Constrained Biometric System for Non-Cooperative Users
    Jahromi, Mohammad N. S.
    Buch-Cardona, Pau
    Avots, Egils
    Nasrollahi, Kamal
    Escalera, Sergio
    Moeslund, Thomas B.
    Anbarjafari, Gholamreza
    [J]. ENTROPY, 2019, 21 (11)
  • [9] Accurately bearing measurement in non-cooperative passive location system
    Liu, Zhi-Qiang
    Ma, Hong-Guang
    Yang, Li-Feng
    [J]. Hedianzixue Yu Tance Jishu/Nuclear Electronics and Detection Technology, 2007, 27 (03): : 487 - 490
  • [10] Location Accuracy Analysis for Single Station with Non-cooperative Emitter
    Xiang, Rong
    Ouyang, Xinxin
    Xiong, Jinyu
    [J]. INTERNATIONAL SYMPOSIUM ON FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION (FSKDNC 2014), 2014, : 290 - 295