DocumentCode
3541124
Title
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory
Author
Xinyu Jin ; Pissinou, Niki ; Pumpichet, Sitthapon ; Kamhoua, Charles A. ; Kwiat, Kevin
Author_Institution
Dept. of ECE, Florida Int. Univ., Miami, FL, USA
fYear
2013
fDate
21-24 Oct. 2013
Firstpage
835
Lastpage
842
Abstract
As new mobile Wireless Sensor Networks (mWSNs) for location-aware applications are emerging, trajectory privacy invasion is becoming an indispensable issue. Many promising techniques are under development. Considering the decentralized network architecture, most of Trajectory Privacy Preservation (TPP) techniques rely on the cooperation from peer nodes, cluster headers, or a third party. However, only a few works have addressed the issue of selfish behaviors in such cooperation required techniques. Nevertheless, the problem of facing selfish and compromised nodes in the noncooperative and hostile environment is rarely touched. In this paper, we apply Bayesian game theory to model cooperative, selfish and malicious behaviors of autonomous mobile nodes in decentralized mWSNs. We formulate and analyze the TPP game among peer nodes in both strategic and dynamic forms. The equilibrium strategies for users to evaluate the degree of trust in participating in in-network TPP activities are provided and analyzed in theoretical and simulation results.
Keywords
belief networks; game theory; wireless sensor networks; Bayesian game theory; TPP techniques; decentralized mWSN; in-network TPP activities; location-aware applications; mobile wireless sensor networks; trajectory privacy preservation; Bayes methods; Games; Peer-to-peer computing; Privacy; Sensitivity; Sensors; Trajectory;
fLanguage
English
Publisher
ieee
Conference_Titel
Local Computer Networks (LCN), 2013 IEEE 38th Conference on
Conference_Location
Sydney, NSW
ISSN
0742-1303
Print_ISBN
978-1-4799-0536-2
Type
conf
DOI
10.1109/LCN.2013.6761339
Filename
6761339
Link To Document