In mobile networks, authentication is a required primitive for the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. Because this approach is costly, self-interested mobile nodes might decide not to cooperate and could thus jeopardize the achievable location privacy. In this paper, we analyze the non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. We first analyze the Nash equilibria in n-player complet...
Most popular location-based social networks, such as Facebook and Foursquare, let their (mobile) use...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
abstract: While network problems have been addressed using a central administrative domain with a si...
In mobile networks, authentication is a required primitive for most security protocols. Unfortunatel...
Mobile social networks and location-aware applications are becoming more and more widespread in curr...
Abstract: In mobile networks, authentication is a required primitive for most security protocols. Un...
Users of mobile networks can change their identifiers in regions called mix zones in order to defeat...
Abstract. Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic...
Nowadays, mobile users have a vast number of applications and services at their disposal. Each of th...
In this thesis, game theoretic analysis of wireless communication networks has been performed. Game ...
Abstract- The user centric approach is used for game changes. In mix zone model is used for attacker...
The mainstream approach to protecting the privacy of mobile users in location-based services (LBSs) ...
Abstract. Users of mobile networks can change their identifiers in re-gions called mix zones in orde...
This paper proposes a user-centered location privacy game mechanism,which is aimed to generate corre...
In many envisioned mobile ad hoc networks, nodes are expected to periodically beacon to advertise th...
Most popular location-based social networks, such as Facebook and Foursquare, let their (mobile) use...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
abstract: While network problems have been addressed using a central administrative domain with a si...
In mobile networks, authentication is a required primitive for most security protocols. Unfortunatel...
Mobile social networks and location-aware applications are becoming more and more widespread in curr...
Abstract: In mobile networks, authentication is a required primitive for most security protocols. Un...
Users of mobile networks can change their identifiers in regions called mix zones in order to defeat...
Abstract. Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic...
Nowadays, mobile users have a vast number of applications and services at their disposal. Each of th...
In this thesis, game theoretic analysis of wireless communication networks has been performed. Game ...
Abstract- The user centric approach is used for game changes. In mix zone model is used for attacker...
The mainstream approach to protecting the privacy of mobile users in location-based services (LBSs) ...
Abstract. Users of mobile networks can change their identifiers in re-gions called mix zones in orde...
This paper proposes a user-centered location privacy game mechanism,which is aimed to generate corre...
In many envisioned mobile ad hoc networks, nodes are expected to periodically beacon to advertise th...
Most popular location-based social networks, such as Facebook and Foursquare, let their (mobile) use...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
abstract: While network problems have been addressed using a central administrative domain with a si...