International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 119 | Views: 128

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


Achieving Location Privacy through the Impact of Changing Pseudonyms

S. Sharath Chandra | Dasu Vaman Ravi Prasad [3]


Abstract: In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, a competitor can monitor pseudonyms used for authentication to track the location of mobile nodes. A regularly proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is very expensive. Self-interested mobile nodes might thus decide not to cooperate and jeopardize the achievable location privacy. In this paper, we examine non-cooperative behaviour of mobile nodes, where each node aims at increasing its location privacy at a least cost. As in practice mobile nodes do not know their rivals payoffs, we then consider static incomplete information. By means of numerical outcomes, we then predict the behaviour of selsh mobile nodes.


Keywords: Security and privacy protection, pseudonym, mobile computing, network protocols, mix zones


Edition: Volume 3 Issue 9, September 2014,


Pages: 391 - 393


How to Download this Article?

Type Your Email Address below to Download the Article PDF


How to Cite this Article?

S. Sharath Chandra, Dasu Vaman Ravi Prasad, "Achieving Location Privacy through the Impact of Changing Pseudonyms", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 391-393, https://www.ijsr.net/get_abstract.php?paper_id=SEP14157



Similar Articles with Keyword 'pseudonym'

Downloads: 99

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil | Yogesh B. Gurav [2]

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2161 - 2167

Preserving Trajectory Privacy in Participatory Sensing Applications

Gauri R Virkar | Sanchika A Bajpai

Share this Article



Top