Achieving Location Privacy through the Impact of Changing Pseudonyms
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 9)Publication Date: 2014-09-05
Authors : S. Sharath Chandra; Dasu Vaman Ravi Prasad;
Page : 391-393
Keywords : Security and privacy protection; pseudonym; mobile computing; network protocols; mix zones;
Abstract
In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, a competitor can monitor pseudonyms used for authentication to track the location of mobile nodes. A regularly proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is very expensive. Self-interested mobile nodes might thus decide not to cooperate and jeopardize the achievable location privacy. In this paper, we examine non-cooperative behaviour of mobile nodes, where each node aims at increasing its location privacy at a least cost. As in practice mobile nodes do not know their rivals payoffs, we then consider static incomplete information. By means of numerical outcomes, we then predict the behaviour of selsh mobile nodes.
Other Latest Articles
- Value Added Products of Tasar Silkworm Cocoon by Utilization
- Characterization, AC Conductivity and Dielectric behaviour of Chemically Synthesized Poly Meta-Aminophenol
- Assessment of Effectiveness of Educational Intervention on Knowledge among Bio-Medical Waste Handlers
- Effect of Zinc Electroplating Industry Effluent Residue on Growth and Certain Biochemical Characteristics of Cluster Bean (Cyamopsis Tetragonoloba) L. Taub
- Minimum Bounding Circle of 2D Convex Hull
Last modified: 2021-06-30 21:07:44