Downloads: 119 | Views: 273
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.1 / 10
Achieving Location Privacy through the Impact of Changing Pseudonyms
S. Sharath Chandra, Dasu Vaman Ravi Prasad
Abstract: In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, a competitor can monitor pseudonyms used for authentication to track the location of mobile nodes. A regularly proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is very expensive. Self-interested mobile nodes might thus decide not to cooperate and jeopardize the achievable location privacy. In this paper, we examine non-cooperative behaviour of mobile nodes, where each node aims at increasing its location privacy at a least cost. As in practice mobile nodes do not know their rivals payoffs, we then consider static incomplete information. By means of numerical outcomes, we then predict the behaviour of selsh mobile nodes.
Keywords: Security and privacy protection, pseudonym, mobile computing, network protocols, mix zones
Edition: Volume 3 Issue 9, September 2014
Pages: 391 - 393
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 100 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1486 - 1489Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil, Yogesh B. Gurav
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2161 - 2167Preserving Trajectory Privacy in Participatory Sensing Applications
Gauri R Virkar, Sanchika A Bajpai
Downloads: 111
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1297 - 1299Secure Cloud Storage with Anonymous Authentication using Decentralized Access Control
Jessy Cherian
Downloads: 116
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1314 - 1316Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing
Kirti Patil, Sonali Patil
Downloads: 117 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2178 - 2179Blocking Misbehaving User & Activities in Social Network
Rashmi Gourkar, Garima Singh