• DocumentCode
    59779
  • Title

    Non-Cooperative Location Privacy

  • Author

    Freudiger, J. ; Manshaei, Mohammad Hossein ; Hubaux, Jean-Pierre ; Parkes, David C.

  • Author_Institution
    Sch. of Comput. & Commun. Sci., EPFL, Lausanne, Switzerland
  • Volume
    10
  • Issue
    2
  • fYear
    2013
  • fDate
    March-April 2013
  • Firstpage
    84
  • Lastpage
    98
  • Abstract
    In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. Self-interested mobile nodes might, thus, decide not to cooperate and jeopardize the achievable location privacy. In this paper, we analyze non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. We obtain Nash equilibria in static n-player complete information games. As in practice mobile nodes do not know their opponents´ payoffs, we then consider static incomplete information games. We establish that symmetric Bayesian-Nash equilibria exist with simple threshold strategies. By means of numerical results, we predict behavior of selfish mobile nodes. We then investigate dynamic games where players decide to change their pseudonym one after the other and show how this affects strategies at equilibrium. Finally, we design protocols-PseudoGame protocols-based on the results of our analysis and simulate their performance in vehicular network scenarios.
  • Keywords
    data privacy; game theory; mobile computing; protocols; authentication; dynamic games; game theoretic model; mix zones; mobile networks; mobile node location; noncooperative behavior; noncooperative location privacy; security protocols; static n-player; symmetric Bayesian-Nash equilibria; Games; Peer to peer computing; Privacy; Protocols; Security and privacy protection; mobile computing; network protocols;
  • fLanguage
    English
  • Journal_Title
    Dependable and Secure Computing, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1545-5971
  • Type

    jour

  • DOI
    10.1109/TDSC.2012.85
  • Filename
    6336754