Title :
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory
Author :
Xinyu Jin ; Pissinou, Niki ; Pumpichet, Sitthapon ; Kamhoua, Charles A. ; Kwiat, Kevin
Author_Institution :
Dept. of ECE, Florida Int. Univ., Miami, FL, USA
Abstract :
As new mobile Wireless Sensor Networks (mWSNs) for location-aware applications are emerging, trajectory privacy invasion is becoming an indispensable issue. Many promising techniques are under development. Considering the decentralized network architecture, most of Trajectory Privacy Preservation (TPP) techniques rely on the cooperation from peer nodes, cluster headers, or a third party. However, only a few works have addressed the issue of selfish behaviors in such cooperation required techniques. Nevertheless, the problem of facing selfish and compromised nodes in the noncooperative and hostile environment is rarely touched. In this paper, we apply Bayesian game theory to model cooperative, selfish and malicious behaviors of autonomous mobile nodes in decentralized mWSNs. We formulate and analyze the TPP game among peer nodes in both strategic and dynamic forms. The equilibrium strategies for users to evaluate the degree of trust in participating in in-network TPP activities are provided and analyzed in theoretical and simulation results.
Keywords :
belief networks; game theory; wireless sensor networks; Bayesian game theory; TPP techniques; decentralized mWSN; in-network TPP activities; location-aware applications; mobile wireless sensor networks; trajectory privacy preservation; Bayes methods; Games; Peer-to-peer computing; Privacy; Sensitivity; Sensors; Trajectory;
Conference_Titel :
Local Computer Networks (LCN), 2013 IEEE 38th Conference on
Conference_Location :
Sydney, NSW
Print_ISBN :
978-1-4799-0536-2
DOI :
10.1109/LCN.2013.6761339