On Non-Cooperative Location Privacy: A Game-Theoretic Analysis

被引:0
|
作者
Freudiger, Julien [1 ]
Manshaei, Mohammad Hossein [1 ]
Hubaux, Jean-Pierre [1 ]
Parkes, David C.
机构
[1] Ecole Polytech Fed Lausanne, Sch Comp & Commun Sci, Lausanne, Switzerland
来源
CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2009年
关键词
Location Privacy; Game Theory; Mobile Networks;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In mobile networks, authentication is a required primitive for the majority of security protocols However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones Because tins approach is costly, self-interested mobile nodes might decide not to cooperate and could thus jeopardize the achievable location privacy In this paper, we analyze the non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost We first analyze the Nash equilibria in n-player complete information games Because mobile nodes in a privacy-sensitive system do not know their opponents' payoffs, we then consider incomplete information games We establish that symmetric Bayesian-Nash equilibria exist with simple threshold strategies in n-player games and derive the equilibrium strategies By means of numerical results, we show that mobile nodes become selfish when the cost of changing pseudonyms is small, whereas they cooperate more when the cost of changing pseudonyms increases Finally, we design a protocol - the Pseudo Game protocol - based on the results of our analysis
引用
收藏
页码:324 / 337
页数:14
相关论文
共 50 条
  • [1] Non-Cooperative Operators in a Game-Theoretic Framework
    Bennis, Mehdi
    Lara, Juan
    Tolli, Antti
    2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, 2008, : 2065 - +
  • [2] Game-Theoretic Approach for Non-Cooperative Planning
    Jordan, Jaume
    Onaindia, Eva
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 1357 - 1363
  • [3] Game-Theoretic System Design for Non-Cooperative Scenarios
    Colombi, John M.
    Donohoo, Benjamin C.
    2023 IEEE INTERNATIONAL SYSTEMS CONFERENCE, SYSCON, 2023,
  • [4] A game-theoretic approach to non-cooperative target assignment
    Kalam, Shemin
    Gani, Mahbub
    Seneviratne, Lakmal
    ROBOTICS AND AUTONOMOUS SYSTEMS, 2010, 58 (08) : 955 - 962
  • [5] Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM
    Zhang, Zhiyong
    Pei, Qingqi
    Ma, Jianfeng
    Yang, Lin
    Fan, Kefeng
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 1133 - +
  • [6] Non-cooperative code design in radar networks: a game-theoretic approach
    Piezzo, Marco
    Aubry, Augusto
    Buzzi, Stefano
    De Maio, Antonio
    Farina, Alfonso
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2013,
  • [7] Non-cooperative code design in radar networks: a game-theoretic approach
    Marco Piezzo
    Augusto Aubry
    Stefano Buzzi
    Antonio De Maio
    Alfonso Farina
    EURASIP Journal on Advances in Signal Processing, 2013
  • [8] Non-cooperative Resource Allocation Game-Theoretic Approach in Underwater Acoustics
    Gharsalli, Khouloud
    Bouvet, Pierre-Jean
    Najeh, Sameh
    Besbes, Hichem
    Le Pors, Thierry
    Gazzah, Houssem
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 632 - 637
  • [9] A Non-cooperative Game-Theoretic Framework for Sponsoring Content in the Internet Market
    Garmani, Hamid
    Omar, Driss Ait
    El Amrani, Mohamed
    Baslam, Mohamed
    Jourhmane, Mostafa
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2020, 16 (04) : 316 - 323
  • [10] A non-cooperative game-theoretic framework for resource allocation in network virtualization
    M. Said Seddiki
    Mounir Frikha
    Ye-Qiong Song
    Telecommunication Systems, 2016, 61 : 209 - 219