MixZone in Motion: Achieving Dynamically Cooperative Location Privacy Protection in Delay-Tolerant Networks

被引:33
作者
Du, Suguo [1 ]
Zhu, Haojin [2 ]
Li, Xiaolong [1 ]
Ota, Kaoru [3 ]
Dong, Mianxiong [4 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Management Sci, Shanghai 200052, Peoples R China
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[3] Muroran Inst Technol, Dept Informat & Elect Engn, Muroran, Hokkaido 0508585, Japan
[4] Univ Aizu, Sch Comp Sci & Engn, Aizu Wakamatsu, Fukushima 9658580, Japan
基金
国家教育部博士点专项基金资助; 日本学术振兴会; 中国国家自然科学基金;
关键词
Delay-tolerant network (DTN); game theory; location privacy; mix zone; SCHEME;
D O I
10.1109/TVT.2013.2266347
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Delay-tolerant networks (DTNs) are typically sparse ad hoc networks where node density is low and contacts between nodes in the network do not occur very frequently. The existing location privacy protection methods, which require mobile nodes to collectively change their pseudonyms in special regions called mix zones, may not work well in DTNs due to their unique characteristics, including low network density and limited contact duration. In this paper, we propose a novel cooperative location privacy protection scheme, which is called AVATAR, for sparse DTNs. The main idea of AVATAR is to generate a certain number of virtual nodes in the proximity of a node and allow both virtual and real nodes to make a coordinated pseudonym change in an enlarged region, which are named virtual mix zones. Each AVATAR participant benefits from increased location privacy protection at the cost of generating a series of signed position messages, which are named footprint signatures. To stimulate each node to contribute more footprint signatures to the virtual mix zones, AVATAR proposes a reward mechanism, which is modeled as a multiunit discriminatory auction game. Extensive simulations and analysis have been provided to demonstrate the effectiveness and efficiency of the proposed scheme.
引用
收藏
页码:4565 / 4575
页数:11
相关论文
共 24 条
[1]  
[Anonymous], PEER TO PEER NETWORK
[2]  
[Anonymous], 2000, EPIDEMIC ROUTING PAR
[3]  
[Anonymous], P INFOCOM IEEE
[4]   Location privacy in pervasive computing [J].
Beresford, AR ;
Stajano, F .
IEEE PERVASIVE COMPUTING, 2003, 2 (01) :46-55
[5]  
Danev B, 2010, WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P89
[6]  
Freudiger J, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P324
[7]  
Greenstein B, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P40
[8]   Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis [J].
Gruteser, M ;
Grunwald, D .
MOBILE NETWORKS & APPLICATIONS, 2005, 10 (03) :315-325
[9]  
Hoh B, 2006, IEEE PERVAS COMPUT, V5, P38, DOI 10.1109/MPRV.2006.69
[10]  
Huang L., 2005, Privacy Enhancing Technologies. 5th International Workshop, PET 2005. Revised Selected Papers (Lecture Notes in Computer Science Vol. 3856), P59