Achieving Location Privacy through the Impact of Changing Pseudonyms
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 119 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Achieving Location Privacy through the Impact of Changing Pseudonyms

S. Sharath Chandra, Dasu Vaman Ravi Prasad

In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, a competitor can monitor pseudonyms used for authentication to track the location of mobile nodes. A regularly proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is very expensive. Self-interested mobile nodes might thus decide not to cooperate and jeopardize the achievable location privacy. In this paper, we examine non-cooperative behaviour of mobile nodes, where each node aims at increasing its location privacy at a least cost. As in practice mobile nodes do not know their rivals payoffs, we then consider static incomplete information. By means of numerical outcomes, we then predict the behaviour of selsh mobile nodes.

Keywords: Security and privacy protection, pseudonym, mobile computing, network protocols, mix zones

Edition: Volume 3 Issue 9, September 2014

Pages: 391 - 393

Share this Article

How to Cite this Article?

S. Sharath Chandra, Dasu Vaman Ravi Prasad, "Achieving Location Privacy through the Impact of Changing Pseudonyms", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14157, Volume 3 Issue 9, September 2014, 391 - 393

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'pseudonym'

Downloads: 99 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2161 - 2167

Preserving Trajectory Privacy in Participatory Sensing Applications

Gauri R Virkar, Sanchika A Bajpai

Share this Article

Downloads: 114 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Downloads: 116 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this Article

Downloads: 119 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 391 - 393

Achieving Location Privacy through the Impact of Changing Pseudonyms

S. Sharath Chandra, Dasu Vaman Ravi Prasad

Share this Article

Similar Articles with Keyword 'mobile computing'

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1391 - 1393

A Survey on Integrity Protection Mechanisms for Open Mobile Platform

Alankrita Ladage, Prof. T. H. Gurav

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1837 - 1840

A Survey on Enabling Rich Mobile Multimedia Constructed By an Adaptive Mobile Cloud Computing

Mayur P. Band, N.D.Kale

Share this Article

Downloads: 109 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2438 - 2441

STOC: Energy Cost Models of Smartphones for Task Offloading to the Cloud

Rahitha K, Gireesh T K

Share this Article

Downloads: 113 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1891 - 1896

M_Commerce Means Mobile Computing

Shraddha C. Belsare, Anjali B. Raut

Share this Article

Downloads: 113 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 5, May 2017

Pages: 1305 - 1311

A Survey on Medical Image Segmentation

Gagandeep Kaur, Jyotirmoy Chhaterji

Share this Article

Similar Articles with Keyword 'network protocols'

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Comparative Studies, Computer Science & Engineering, India, Volume 7 Issue 9, September 2018

Pages: 1312 - 1314

A Comparison of Streaming Sensory Data Transfer Methods in Remote Processing Environment

Arush Nagpal, Prashant Singh Rana

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Informative Article, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 74 - 79

Mobile Ad hoc Network

R. Marutha Veni, R. Latha

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2810 - 2816

Parallelization of Symmetric and Asymmetric security Algorithms for MultiCore Architectures

T. Balamurugan, T. Hemalatha

Share this Article

Downloads: 115 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2165 - 2168

A Survey on Packet Retrieval for Three-hop Routing Protocol in Hybrid Wireless Networks

Bendre Shital U., R. P. Jadhav

Share this Article

Similar Articles with Keyword 'mix zones'

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2161 - 2167

Preserving Trajectory Privacy in Participatory Sensing Applications

Gauri R Virkar, Sanchika A Bajpai

Share this Article

Downloads: 119 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 391 - 393

Achieving Location Privacy through the Impact of Changing Pseudonyms

S. Sharath Chandra, Dasu Vaman Ravi Prasad

Share this Article



Top