Non-Cooperative Location Privacy

被引:53
作者
Freudiger, Julien [1 ]
Manshaei, Mohammad Hossein [2 ]
Hubaux, Jean-Pierre [1 ]
Parkes, David C. [3 ]
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Stn 14, CH-1015 Lausanne, Switzerland
[2] Isfahan Univ Technol, Dept Elect & Comp Engn, Esfahan 8415683111, Iran
[3] Harvard Univ, Sch Engn & Appl Sci, Maxwell Dworkin, Cambridge, MA 02138 USA
关键词
Security and privacy protection; mobile computing; network protocols;
D O I
10.1109/TDSC.2012.85
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. Self-interested mobile nodes might, thus, decide not to cooperate and jeopardize the achievable location privacy. In this paper, we analyze non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. We obtain Nash equilibria in static n-player complete information games. As in practice mobile nodes do not know their opponents' payoffs, we then consider static incomplete information games. We establish that symmetric Bayesian-Nash equilibria exist with simple threshold strategies. By means of numerical results, we predict behavior of selfish mobile nodes. We then investigate dynamic games where players decide to change their pseudonym one after the other and show how this affects strategies at equilibrium. Finally, we design protocols-PseudoGame protocols-based on the results of our analysis and simulate their performance in vehicular network scenarios.
引用
收藏
页码:84 / 98
页数:15
相关论文
共 27 条
[1]  
Alliance Wi-Fi, 2010, WI FI CERTIFIED WI F
[2]  
[Anonymous], 2005, P EMB SEC CARS ESCAR
[3]  
[Anonymous], 1991, Game Theory
[4]  
[Anonymous], 2007, ACM WORKSH WIR NETW
[5]  
[Anonymous], P 3 EUR WORKSH SEC P
[6]  
[Anonymous], 2010, OFFICIAL NOKIA BLOG
[7]  
[Anonymous], P 5 ACM WORKSH PRIV
[8]  
[Anonymous], P SIGCOMM
[9]   Mix zones: User privacy in location-aware services [J].
Beresford, AR ;
Stajano, F .
SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, :127-131
[10]  
Buttyan L., 2007, P 4 EUR C SEC PRIV A