A Preserving Location Privacy of Mobile Network | Abstract

ISSN ONLINE(2320-9801) PRINT (2320-9798)

Special Issue Article Open Access

A Preserving Location Privacy of Mobile Network


Mobile network consists of number of mobile nodes moving in the network randomly, In mobile networks authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. Self interested mobile nodes might, thus, decide not to cooperate and jeopardize the achievable location privacy. To analyze non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. We obtain Nash equilibria in static n-player complete information games. As in practice mobile nodes do not know their opponents’ payoffs, we then consider static incomplete information games. To establish that symmetric Bayesian-Nash equilibria exist with simple threshold strategies. By means of numerical results, we predict behavior of selfish mobile nodes. We then investigate dynamic games where players decide to change their pseudonym one after the other and show how this affects strategies at equilibrium. Finally, we design protocols—Pseudo Game protocols—based on the results of our analysis and simulate their performance in vehicular network scenarios, The pseudonyms key changes mainly used in many areas such as peer to peer communication and wireless network, because this network only each time change the location .Public and private key is used for transferring the information, number of routing algorithm is used for route the information.

P. Sakthi Priyanka and B. Raja Rajeswari, Tamilnadu, India

To read the full article Download Full Article | Visit Full Article