메뉴 건너뛰기




Volumn , Issue , 2009, Pages 324-337

On non-cooperative location privacy: A game-theoretic analysis

Author keywords

Game theory; Location privacy; Mobile networks

Indexed keywords

BAYESIAN; COMPLETE INFORMATION; EQUILIBRIUM STRATEGY; GAME-THEORETIC MODEL; INCOMPLETE INFORMATION GAMES; LOCATION PRIVACY; MINIMUM COST; MOBILE NETWORKS; MOBILE NODES; NASH EQUILIBRIA; NON-COOPERATIVE; NON-COOPERATIVE BEHAVIORS; NUMERICAL RESULTS; SECURITY PROTOCOLS; SENSITIVE SYSTEMS; THEORETIC ANALYSIS; THRESHOLD STRATEGY;

EID: 74049097109     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653702     Document Type: Conference Paper
Times cited : (149)

References (56)
  • 1
    • 74049157936 scopus 로고    scopus 로고
    • http://www.aka-aki.com/.
  • 2
    • 74049148635 scopus 로고    scopus 로고
    • http://www.csg.ethz.ch/research/projects/Blue-star.
  • 3
    • 74049149570 scopus 로고    scopus 로고
    • http://reality.media.mit.edu/serendipity.php.
  • 4
    • 74049104293 scopus 로고    scopus 로고
    • IEEE P1609.2 Version 1. Standard for wireless access in vehicular environments, security services for applications and management messages. In development, 2006
    • IEEE P1609.2 Version 1. Standard for wireless access in vehicular environments - security services for applications and management messages. In development, 2006.
  • 6
  • 7
    • 2942587015 scopus 로고    scopus 로고
    • Mix zones: User privacy in location-aware services
    • A. R. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In PerSec, 2004.
    • (2004) PerSec
    • Beresford, A.R.1    Stajano, F.2
  • 8
    • 60149092949 scopus 로고    scopus 로고
    • Wireless device identification with radiometric signatures
    • V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In MobiCom, 2008.
    • (2008) MobiCom
    • Brik, V.1    Banerjee, S.2    Gruteser, M.3    Oh, S.4
  • 9
    • 58149134080 scopus 로고    scopus 로고
    • On the effectiveness of changing pseudonyms to provide location privacy in VANETs
    • L. Buttyan, T. Holczer, and I. Vajda. On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In ESAS, 2007.
    • (2007) ESAS
    • Buttyan, L.1    Holczer, T.2    Vajda, I.3
  • 12
    • 0038687775 scopus 로고    scopus 로고
    • J. Camenisch and E. Van Herreweghen. Design and implementation of the Idemix anonymous credential system. In CCS, 2002.
    • J. Camenisch and E. Van Herreweghen. Design and implementation of the Idemix anonymous credential system. In CCS, 2002.
  • 13
    • 34547379480 scopus 로고    scopus 로고
    • J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich. How to win the clone wars: efficient periodic n-times anonymous authentication. In CCS, 2006.
    • J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich. How to win the clone wars: efficient periodic n-times anonymous authentication. In CCS, 2006.
  • 14
    • 38049146172 scopus 로고    scopus 로고
    • Batch verification of short signatures
    • J. Camenish, S. Hohenberger, and M. O. Pedersen. Batch verification of short signatures. In EUROCRYPT, volume 4515, pages 246-263, 2007.
    • (2007) EUROCRYPT , vol.4515 , pp. 246-263
    • Camenish, J.1    Hohenberger, S.2    Pedersen, M.O.3
  • 15
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2
    • Chaum, D.1
  • 19
    • 71049178173 scopus 로고    scopus 로고
    • Transient-based identification of wireless sensor nodes
    • B. Danev and S. Capkun. Transient-based identification of wireless sensor nodes. In IPSN, 2009.
    • (2009) IPSN
    • Danev, B.1    Capkun, S.2
  • 20
    • 13944266651 scopus 로고    scopus 로고
    • A delay-tolerant network architecture for challenged internets
    • K. Fall. A delay-tolerant network architecture for challenged internets. In SIGCOMM, 2003.
    • (2003) SIGCOMM
    • Fall, K.1
  • 23
    • 74049139346 scopus 로고    scopus 로고
    • Self-organized anonymous authentication in mobile networks
    • J. Freudiger, M. Raya, and J.-P. Hubaux. Self-organized anonymous authentication in mobile networks. In SECURECOMM, 2009.
    • (2009) SECURECOMM
    • Freudiger, J.1    Raya, M.2    Hubaux, J.-P.3
  • 27
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mob. Netw. Appl., 2005.
    • (2005) Mob. Netw. Appl
    • Gruteser, M.1    Grunwald, D.2
  • 28
    • 11144331561 scopus 로고    scopus 로고
    • Enhancing intrusion detection in wireless networks using radio frequency fingerprinting
    • J. Hall, M. Barbeau, and E. Kranakis. Enhancing intrusion detection in wireless networks using radio frequency fingerprinting. In CIIT, 2004.
    • (2004) CIIT
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 29
    • 4544259607 scopus 로고    scopus 로고
    • Rational secret sharing and multiparty computation: Extended abstract
    • J. Halpern and V. Teague. Rational secret sharing and multiparty computation: extended abstract. In STOC, pages 623-632, 2004.
    • (2004) STOC , pp. 623-632
    • Halpern, J.1    Teague, V.2
  • 30
    • 0000725056 scopus 로고
    • Games with incomplete information played by Bayesian players
    • J. Harsanyi. Games with incomplete information played by Bayesian players. Management Science, 1967.
    • (1967) Management Science
    • Harsanyi, J.1
  • 32
    • 33847315663 scopus 로고    scopus 로고
    • Protecting location privacy through path confusion
    • B. Hoh and M. Gruteser. Protecting location privacy through path confusion. In SECURECOMM, pages 194-205, 2005.
    • (2005) SECURECOMM , pp. 194-205
    • Hoh, B.1    Gruteser, M.2
  • 34
    • 33750879264 scopus 로고    scopus 로고
    • Enhancing security and privacy in traffic-monitoring systems
    • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Enhancing security and privacy in traffic-monitoring systems. IEEE Pervasive Computing, 5(4):38-46, 2006.
    • (2006) IEEE Pervasive Computing , vol.5 , Issue.4 , pp. 38-46
    • Hoh, B.1    Gruteser, M.2    Xiong, H.3    Alrabady, A.4
  • 35
    • 74049122962 scopus 로고    scopus 로고
    • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in GPS traces via path cloaking. In CCS, 2007.
    • B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in GPS traces via path cloaking. In CCS, 2007.
  • 36
    • 24944489750 scopus 로고    scopus 로고
    • Enhancing wireless location privacy using silent period
    • L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. Enhancing wireless location privacy using silent period. In ECNC, 2005.
    • (2005) ECNC
    • Huang, L.1    Matsuura, K.2    Yamane, H.3    Sezaki, K.4
  • 37
    • 74049089535 scopus 로고    scopus 로고
    • L. Huang, K. Matsuura, H. Yamane, and K. Sezako. Towards modeling wireless location privacy. In PET, 2005.
    • L. Huang, K. Matsuura, H. Yamane, and K. Sezako. Towards modeling wireless location privacy. In PET, 2005.
  • 38
    • 33748582624 scopus 로고    scopus 로고
    • Rational secure computation and ideal mechanism design
    • S. Izmalkov, S. Micali, and M. Lepinski. Rational secure computation and ideal mechanism design. In FOCS, pages 585-595, 2005.
    • (2005) FOCS , pp. 585-595
    • Izmalkov, S.1    Micali, S.2    Lepinski, M.3
  • 39
    • 74049117319 scopus 로고    scopus 로고
    • J. Katz. Bridging game theory and cryptography: Recent results and future directions. In TCC, 2008.
    • J. Katz. Bridging game theory and cryptography: Recent results and future directions. In TCC, 2008.
  • 40
    • 24344507334 scopus 로고    scopus 로고
    • Remote physical device fingerprinting
    • T. Kohno, A. Broido, and K.C. Claffy. Remote physical device fingerprinting. TDSC, 2, 2005.
    • (2005) TDSC , vol.2
    • Kohno, T.1    Broido, A.2    Claffy, K.C.3
  • 42
    • 51249095993 scopus 로고    scopus 로고
    • Inference attacks on location tracks
    • J. Krumm. Inference attacks on location tracks. In Pervasive, 2007.
    • (2007) Pervasive
    • Krumm, J.1
  • 43
    • 34247381045 scopus 로고    scopus 로고
    • Swing & swap: User centric approaches towards maximizing location privacy
    • M. Li, K. Sampigethaya, L. Huang, and R. Poovendran. Swing & swap: User centric approaches towards maximizing location privacy. In WPES, 2006.
    • (2006) WPES
    • Li, M.1    Sampigethaya, K.2    Huang, L.3    Poovendran, R.4
  • 46
    • 51349157157 scopus 로고    scopus 로고
    • Implications of radio fingerprinting on the security of sensor networks
    • B. Rasmussen and S. Capkun. Implications of radio fingerprinting on the security of sensor networks. In SECURECOMM, 2007.
    • (2007) SECURECOMM
    • Rasmussen, B.1    Capkun, S.2
  • 47
    • 70349267771 scopus 로고    scopus 로고
    • M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux. Revocation Games in Ephemeral Networks. In CCS, 2008.
    • M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux. Revocation Games in Ephemeral Networks. In CCS, 2008.
  • 48
    • 33644812740 scopus 로고    scopus 로고
    • Computing best-response strategies in infinite games of incomplete information
    • D. M. Reeves and M.P. Wellman. Computing best-response strategies in infinite games of incomplete information. In Uncertainty in artificial intelligence, pages 470-478, 2004.
    • (2004) Uncertainty in artificial intelligence , pp. 470-478
    • Reeves, D.M.1    Wellman, M.P.2
  • 52
    • 74049153572 scopus 로고    scopus 로고
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In PET, 2002.
    • A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In PET, 2002.
  • 54
    • 74049103464 scopus 로고    scopus 로고
    • Economic aspects of personal privacy
    • UC Berkeley
    • H. Varian. Economic aspects of personal privacy. White paper, UC Berkeley, 1996.
    • (1996) White paper
    • Varian, H.1
  • 55
    • 25644446164 scopus 로고    scopus 로고
    • On neighbor discovery in wireless networks with directional antennas
    • S. Vasudevan, J. Kurose, and D. Towsley. On neighbor discovery in wireless networks with directional antennas. In Infocom, 2005.
    • (2005) Infocom
    • Vasudevan, S.1    Kurose, J.2    Towsley, D.3
  • 56
    • 14944368943 scopus 로고    scopus 로고
    • Vehicle-to-vehicle safety messaging in DSRC
    • Q. Xu, T. Mak, J. Ko, and R. Sengupta. Vehicle-to-vehicle safety messaging in DSRC. In VANET, 2004.
    • (2004) VANET
    • Xu, Q.1    Mak, T.2    Ko, J.3    Sengupta, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.