Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. Non-Cooperative Location Privacy
 
research article

Non-Cooperative Location Privacy

Freudiger, Julien
•
Manshaei, Mohammad Hossein
•
Hubaux, Jean-Pierre  
Show more
2013
IEEE Transactions On Dependable And Secure Computing

In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. Self-interested mobile nodes might, thus, decide not to cooperate and jeopardize the achievable location privacy. In this paper, we analyze non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. We obtain Nash equilibria in static n-player complete information games. As in practice mobile nodes do not know their opponents' payoffs, we then consider static incomplete information games. We establish that symmetric Bayesian-Nash equilibria exist with simple threshold strategies. By means of numerical results, we predict behavior of selfish mobile nodes. We then investigate dynamic games where players decide to change their pseudonym one after the other and show how this affects strategies at equilibrium. Finally, we design protocols-PseudoGame protocols-based on the results of our analysis and simulate their performance in vehicular network scenarios.

  • Details
  • Metrics
Type
research article
DOI
10.1109/Tdsc.2012.85
Web of Science ID

WOS:000318893600003

Author(s)
Freudiger, Julien
Manshaei, Mohammad Hossein
Hubaux, Jean-Pierre  
Parkes, David C.
Date Issued

2013

Publisher

Ieee Computer Soc

Published in
IEEE Transactions On Dependable And Secure Computing
Volume

10

Issue

2

Start page

84

End page

98

Subjects

Security and privacy protection

•

mobile computing

•

network protocols

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LDS  
Available on Infoscience
October 1, 2013
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/95155
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés