International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 119 | Views: 273

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.1 / 10


     

Achieving Location Privacy through the Impact of Changing Pseudonyms

S. Sharath Chandra, Dasu Vaman Ravi Prasad


Abstract: In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, a competitor can monitor pseudonyms used for authentication to track the location of mobile nodes. A regularly proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is very expensive. Self-interested mobile nodes might thus decide not to cooperate and jeopardize the achievable location privacy. In this paper, we examine non-cooperative behaviour of mobile nodes, where each node aims at increasing its location privacy at a least cost. As in practice mobile nodes do not know their rivals payoffs, we then consider static incomplete information. By means of numerical outcomes, we then predict the behaviour of selsh mobile nodes.


Keywords: Security and privacy protection, pseudonym, mobile computing, network protocols, mix zones


Edition: Volume 3 Issue 9, September 2014


Pages: 391 - 393



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
S. Sharath Chandra, Dasu Vaman Ravi Prasad, "Achieving Location Privacy through the Impact of Changing Pseudonyms", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 391-393, https://www.ijsr.net/getabstract.php?paperid=SEP14157, DOI: https://www.doi.org/10.21275/SEP14157



Similar Articles

Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2161 - 2167

Preserving Trajectory Privacy in Participatory Sensing Applications

Gauri R Virkar, Sanchika A Bajpai

Share this Article

Downloads: 111

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1297 - 1299

Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control

Jessy Cherian

Share this Article

Downloads: 116

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this Article

Downloads: 117 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article
Top