Skip to main content

Tracking Games in Mobile Networks

  • Conference paper
Decision and Game Theory for Security (GameSec 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6442))

Included in the following conference series:

Abstract

Users of mobile networks can change their identifiers in regions called mix zones in order to defeat the attempt of third parties to track their location. Mix zones must be deployed carefully in the network to reduce the cost they induce on mobile users and to provide high location privacy. Unlike most previous works that assume a global adversary, we consider a local adversary equipped with multiple eavesdropping stations. We study the interaction between the local adversary deploying eavesdropping stations to track mobile users and mobile users deploying mix zones to protect their location privacy. We use a game-theoretic model to predict the strategies of both players. We derive the strategies at equilibrium in complete and incomplete information scenarios and propose an algorithm to compute the equilibrium in a large network. Finally, based on real road-traffic information, we numerically quantify the effect of complete and incomplete information on the strategy selection of mobile users and of the adversary. Our results enable system designers to predict the best response of mobile users with respect to a local adversary strategy, and thus to select the best deployment of countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Acquisti, A., Dingledine, R., Syverson, P.: On the economics of anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 84–102. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Aka-aki, http://www.aka-aki.com

  3. Beresford, A.R., Stajano, F.: Location privacy in pervasive computing. IEEE Pervasive Computing 2, 46–55 (2003)

    Article  Google Scholar 

  4. Beresford, A.R., Stajano, F.: Mix zones: User privacy in location-aware services. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (2004)

    Google Scholar 

  5. Buchegger, S., Alpcan, T.: Security games for vehicular networks. In: 46th Annual Allerton Conference on Communication, Control, and Computing (2008)

    Google Scholar 

  6. Buttyán, L., Holczer, T., Vajda, I.: On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 129–141. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Buttyán, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks. Cambridge University Press, Cambridge (2008)

    Google Scholar 

  8. Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: On non-cooperative location privacy: a game-theoretic analysis. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (2009)

    Google Scholar 

  9. Freudiger, J., Raya, M., Felegyhazi, M., Papadimitratos, P., Hubaux, J.P.: Mix zones for location privacy in vehicular networks. In: Proc. 1st Intl. Wksp. Wireless Networking for Intelligent Transportation Systems (Win-ITS) (2007)

    Google Scholar 

  10. Freudiger, J., Shokri, R., Hubaux, J.P.: On the optimal placement of mix zones. In: Goldberg, I., Atallah, M.J. (eds.) Privacy Enhancing Technologies. LNCS, vol. 5672, pp. 216–234. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  11. Friedman, J.W.: A non-cooperative equilibrium for supergames. The Review of Economic Studies 38, 1–12 (1971)

    Article  MATH  Google Scholar 

  12. Grossklags, J., Johnson, B., Christin, N.: The price of uncertainty in security games. In: Proceedings (online) of the Eighth Workshop on the Economics of Information Security (WEIS), London, UK (2009)

    Google Scholar 

  13. Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services (2003)

    Google Scholar 

  14. Halpern, J.Y., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: Proceedings of the Thirty-Sixth Annual ACM Symposium on Theory of Computing, pp. 623–632 (2004)

    Google Scholar 

  15. Harsanyi, J.: Games with incomplete information played by Bayesian players. Management Science 14, 159–182 (1967)

    Article  MathSciNet  MATH  Google Scholar 

  16. Hartenstein, H., Laberteaux, K.: A tutorial survey on vehicular ad hoc networks. IEEE Communications Magazine 46(6), 164–171 (2008)

    Article  Google Scholar 

  17. Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Enhancing wireless location privacy using silent period. In: IEEE Wireless Communications and Networking Conference (2005)

    Google Scholar 

  18. Huang, L., Matsuura, K., Yamane, H., Sezaki, K.: Towards modeling wireless location privacy. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 59–77. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  19. Humbert, M.: Location privacy amidst local eavesdroppers. Master’s thesis, EPFL (2009)

    Google Scholar 

  20. Isaacs, R.: Differential games: a mathematical theory with applications to warfare and pursuit, control and optimization. Dover Publications, New York (1999)

    MATH  Google Scholar 

  21. Katz, J.: Bridging game theory and cryptography: recent results and future directions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 251–272. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  22. Leyvraz, J.P., Mattenberger, P., Robert-Grandpierre, A.: Mise à jour majeure de la modélisation EMME2 de l´agglomération Lausanne-Morges. Technical Report TRANSP-OR 061208, EPFL (2006)

    Google Scholar 

  23. Li, M., Sampigethay, K., Huang, L., Poovendra, R.: Swing & swap: User centric approaches towards maximizing location privacy. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society (2006)

    Google Scholar 

  24. Luce, R.D., Raiffa, H.: Games and Decisions. Wiley, Chichester (1957)

    MATH  Google Scholar 

  25. MIT Media Lab: Reality Mining, http://reality.media.mit.edu/serendipity.php

  26. Nash, J.: Non-cooperative games. Annals of Mathematics 54 (1951)

    Google Scholar 

  27. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability, and pseudonymity - a proposal for terminology. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, p. 1. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  28. Rasmusen, E.: Games and information. Blackwell, Malden (1989)

    MATH  Google Scholar 

  29. Raya, M., Manshaei, M.H., Felegyhazi, M., Hubaux, J.P.: Revocation games in ephemeral networks. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (2008)

    Google Scholar 

  30. Sampigethaya, K., Huang, L., Li, M., Poovendran, R., Matsuura, K., Sezaki, K.: CARAVAN: providing location privacy for VANET. In: Proceedings of Embedded Security in Cars (ESCAR) (2005)

    Google Scholar 

  31. Schoch, E., Kargl, F., Leinmüller, T., Schlott, S., Papadimitratos, P.: Impact of pseudonym changes on geographic routing in VANETs. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds.) ESAS 2006. LNCS, vol. 4357, pp. 1–2. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  32. Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  33. Varian, H.R.: Economic aspects of personal privacy. In: Internet Policy and Economics (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Humbert, M., Manshaei, M.H., Freudiger, J., Hubaux, JP. (2010). Tracking Games in Mobile Networks. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds) Decision and Game Theory for Security. GameSec 2010. Lecture Notes in Computer Science, vol 6442. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17197-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17197-0_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17196-3

  • Online ISBN: 978-3-642-17197-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics