Proceedings of the 16th ACM Conference on Computer and Communications Security 2009
DOI: 10.1145/1653662.1653702
|View full text |Cite
|
Sign up to set email alerts
|

On non-cooperative location privacy

Abstract: In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. Because this approach is costly, self-interested mobile nodes might decide not to cooperate and could thus jeopardize the achievable location privacy. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
105
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 138 publications
(105 citation statements)
references
References 54 publications
0
105
0
Order By: Relevance
“…Selfish vehicles tend to do not change their pseudonym if they reach the desired privacy level. The vehicle refuses to cooperate with other vehicles while changing the pseudonym [11], which results in reducing the privacy protection level.…”
Section: Related Workmentioning
confidence: 99%
“…Selfish vehicles tend to do not change their pseudonym if they reach the desired privacy level. The vehicle refuses to cooperate with other vehicles while changing the pseudonym [11], which results in reducing the privacy protection level.…”
Section: Related Workmentioning
confidence: 99%
“…As a defense technique, the multiple-pseudonym technique providing both identity and location privacy is widely applied in literatures [13]- [16]. Freudiger et al [14] developed a usercentric location privacy model to measure the evolution of location privacy over time, and they derived the equilibrium strategies on changing pseudonyms for each user from the game-theoretic perspective. Beresford et al [17], [18] explored the concept of mix zone and utilized pseudonym techniques to preserve user location privacy.…”
Section: Related Workmentioning
confidence: 99%
“…1 [14], [21], [22] is adopted, i.e., u i is assigned with a set of asymmetric key pairs and uses the alternatively changing public keys as the user's pseudonyms { pi d i } for the data communication. The unique identity can be protected as only literally-meaningless pseudonyms are exposed to the public.…”
Section: A Network Modelmentioning
confidence: 99%
“…Several protocols (cf. [7,24]) achieve location privacy by relying on ephemeral pseudoidentities. Such approaches provide unlinkability by impeding an adversary's ability to associate different broadcasts with the same node.…”
Section: Related Workmentioning
confidence: 99%