Show simple item record

dc.contributor.authorFreudiger, J.
dc.contributor.authorManshaei, M. H.
dc.contributor.authorHubaux, Jean-Pierre
dc.contributor.authorParkes, David C.
dc.date.accessioned2017-06-12T15:44:42Z
dc.date.issued2013
dc.identifierQuick submit: 2017-03-08T12:01:19-0500
dc.identifier.citationFreudiger, J., M. H. Manshaei, Jean-Pierre Hubaux, and D. C. Parkes. 2013. “Non-Cooperative Location Privacy.” IEEE Transactions on Dependable and Secure Computing 10 (2) (March): 84–98. doi:10.1109/tdsc.2012.85.en_US
dc.identifier.issn1545-5971en_US
dc.identifier.urihttp://nrs.harvard.edu/urn-3:HUL.InstRepos:33009674
dc.description.abstractIn mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. Self-interested mobile nodes might, thus, decide not to cooperate and jeopardize the achievable location privacy. In this paper, we analyze non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. We obtain Nash equilibria in static n-player complete information games. As in practice mobile nodes do not know their opponents' payoffs, we then consider static incomplete information games. We establish that symmetric Bayesian-Nash equilibria exist with simple threshold strategies. By means of numerical results, we predict behavior of selfish mobile nodes. We then investigate dynamic games where players decide to change their pseudonym one after the other and show how this affects strategies at equilibrium. Finally, we design protocols-PseudoGame protocols-based on the results of our analysis and simulate their performance in vehicular network scenarios.en_US
dc.description.sponsorshipEngineering and Applied Sciencesen_US
dc.language.isoen_USen_US
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)en_US
dc.relation.isversionofdoi:10.1109/tdsc.2012.85en_US
dash.licenseOAP
dc.subjectSecurity and Privacy Protectionen_US
dc.subjectMobile Computingen_US
dc.subjectNetwork Protocolsen_US
dc.titleNon-Cooperative Location Privacyen_US
dc.typeJournal Articleen_US
dc.date.updated2017-03-08T17:01:20Z
dc.description.versionAccepted Manuscripten_US
dc.relation.journalIEEE Transactions on Dependable and Secure Computingen_US
dash.depositing.authorParkes, David C.
dc.date.available2012
dc.date.available2017-06-12T15:44:42Z
dc.identifier.doi10.1109/tdsc.2012.85*
dash.contributor.affiliatedParkes, David


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record