Downloads: 119 | Views: 128
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
Achieving Location Privacy through the Impact of Changing Pseudonyms
S. Sharath Chandra | Dasu Vaman Ravi Prasad 
Abstract: In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, a competitor can monitor pseudonyms used for authentication to track the location of mobile nodes. A regularly proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is very expensive. Self-interested mobile nodes might thus decide not to cooperate and jeopardize the achievable location privacy. In this paper, we examine non-cooperative behaviour of mobile nodes, where each node aims at increasing its location privacy at a least cost. As in practice mobile nodes do not know their rivals payoffs, we then consider static incomplete information. By means of numerical outcomes, we then predict the behaviour of selsh mobile nodes.
Keywords: Security and privacy protection, pseudonym, mobile computing, network protocols, mix zones
Edition: Volume 3 Issue 9, September 2014,
Pages: 391 - 393
Similar Articles with Keyword 'pseudonym'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014Pages: 1486 - 1489
Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil | Yogesh B. Gurav 
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015Pages: 2161 - 2167
Preserving Trajectory Privacy in Participatory Sensing Applications
Gauri R Virkar | Sanchika A Bajpai