SlideShare uma empresa Scribd logo
1 de 4
Non-Cooperative Location Privacy
Abstract:
In mobile networks, authentication is a required primitive for most security protocols.
Unfortunately, an adversary can monitor pseudonyms used for authentication to track the
location of mobile nodes. A frequently proposed solution to protect location privacy suggests
that mobile nodes collectively change their pseudonyms in regions called mix zones. This
approach is costly. Self-interested mobile nodes might thus decide not to cooperate and
jeopardize the achievable location privacy. In this paper, we analyze non-cooperative behaviour
of mobile nodes, where each node aims at maximizing its location privacy at a minimum cost.
As in practice mobile nodes do not know their opponents’ payoffs, we then consider static
incomplete information. By means of numerical results, we predict behaviour of selfish mobile
nodes. We then investigate dynamic games where nodes decide to change their pseudonym one
after the other and show how this affects strategies at equilibrium.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Architecture:
Existing System:
In contrast with existing approaches, we consider rational mobile nodes
that locally decide whether to change their pseudonyms. Although selfish behaviour can reduce
the cost of location privacy, it can also jeopardize the welfare achieved with a location privacy
scheme. We investigate whether the multiple pseudonym approach achieves location privacy in
non-cooperative scenarios.
Disadvantages:
The drawback of this model is that nodes may have misaligned incentives (i.e.,
different privacy levels) and this can lead to failed attempts to achieve location privacy.
Proposed System:
We propose a user-centric location privacy model that captures the evolution
of the location privacy level of mobile nodes over time and helps them determine when to
change pseudonyms, which model the decisions of mobile nodes in a mix zone.
Advantages:
We analyze non-cooperative behaviour of mobile nodes by using this model,
where each node aims at maximizing its location privacy at a minimum cost.
Algorithm:
Routing Algorithm:
The adversary A observes the set of n(T) nodes changing pseudonyms,
where T is the time at which the pseudonym change occurs. A compares the set B of
pseudonyms before the change with the set D of pseudonyms after the change and, based on the
mobility of the nodes, predicts the most probable matching . Let pd|b = Pr(“Pseudonym d ∈ D
corresponds to b ∈ B”), that is the probability that a new pseudonym d ∈ D corresponds to an
old pseudonym b ∈ B. As is standard in the literature , the location privacy level of node i
involved in a successful pseudonym change at time T is computed as the adversary’s
uncertainty:
Modules:
1. Location Privacy
2. User Centric Model
3. Pseudonym Change Module
1) Location Privacy:
There are several techniques to mitigate the tracking of mobile nodes. We
consider the use of multiple pseudonyms: over time, mobile nodes change the pseudonym to
sign messages, thus reducing their long term link ability. To avoid spatial correlation of their
location, mobile nodes in proximity coordinate pseudonym changes in regions called mix zones.
We assume that as soon as a node changes pseudonym, the old pseudonym expires and is
removed from the node’s memory. In other words, two nodes cannot use the same pseudonyms
at the same time.
Mix zones can also conceal the trajectory of mobile nodes to protect against the
spatial correlation of location traces, e.g., by using (i) silent/encrypted mix zones (ii) regions
where the adversary has no coverage . Without loss of generality, we assume silent mix zones:
mobile nodes turn off their transceivers and stop sending messages for a certain period of time.
If at least two nodes change pseudonyms in a silent mix zone, a mixing of their whereabouts
occurs and the mix zone becomes a confusion point for the adversary.
2) User Centric Model:
The entropy measures the location privacy achieved in specific mix
zones at some point in time. However, location privacy needs of individuals vary depending
on time and location. It is thus desirable to protect location privacy in a user-centric manner,
such that each user can decide when and where to protect its location privacy. We consider a
user- centric model of location privacy, where each mobile node locally monitors its location
privacy over time. A network-wide metric could evaluate the network but might ignore that
some nodes have a low location privacy level and are traceable for long distances.
As a user-centric approach captures the evolution of location pri- vacy
of users over time, mobile nodes can evaluate the distance over which they are potentially
tracked by an adversary (i.e., the distance-to-confusion) and can act upon it by deciding
whether and when to change its pseudonym. With a user-centric model, mobile nodes can
request a pseudonym change from other nodes in proximity if their local location privacy
level is lower than a desired level.
3) Pseudonym Change Module:
We present the aspects of achieving location privacy with
multiple pseudonyms in a rational environment. The key aspect is to consider costs and the
potential location privacy gain when making a pseudonym change decision. Considering the
cost of pseudonym and the available location privacy gain, the user-centric location privacy
level might encourage selfish mobile nodes to change pseudonym and obtain a satisfactory
location privacy level, as long as other nodes are also changing.
Nodes may also delay their decision in order to try to find
the better conditions that maximize the effectiveness of pseudonym changes. Therefore, we
investigate whether location privacy can emerge in a non-cooperative system despite the cost
of changing pseudonym, differentiated privacy levels, and the need for coordination to
achieve a confusion point.

Mais conteúdo relacionado

Mais procurados

Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
 
A collaborative contact based watchdog for detecting selfish nodes in coopera...
A collaborative contact based watchdog for detecting selfish nodes in coopera...A collaborative contact based watchdog for detecting selfish nodes in coopera...
A collaborative contact based watchdog for detecting selfish nodes in coopera...eSAT Journals
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossipIEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...IEEEGLOBALSOFTTECHNOLOGIES
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
 
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...IRJET Journal
 
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELS
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELSTHE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELS
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELSIJMIT JOURNAL
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksecway
 
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks IJECEIAES
 
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDPRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDijsc
 

Mais procurados (15)

B035410013
B035410013B035410013
B035410013
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...
 
Ad34186189
Ad34186189Ad34186189
Ad34186189
 
A collaborative contact based watchdog for detecting selfish nodes in coopera...
A collaborative contact based watchdog for detecting selfish nodes in coopera...A collaborative contact based watchdog for detecting selfish nodes in coopera...
A collaborative contact based watchdog for detecting selfish nodes in coopera...
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossip
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
Secure Data Collection in Wireless Sensor Networks using Randomized Dispersiv...
 
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELS
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELSTHE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELS
THE IMPACT OF MOBILE NODES ARRIVAL PATTERNS IN MANETS USING POISSON MODELS
 
Dynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networksDynamic coverage of mobile sensor networks
Dynamic coverage of mobile sensor networks
 
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
Reliability Evaluation and Analysis of Mobile Ad Hoc Networks
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-IDPRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
PRIVACY ENHANCEMENT OF NODE IN OPPORTUNISTIC NETWORK BY USING VIRTUAL-ID
 

Semelhante a Non cooperative location privacy

Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsVijay Karan
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsVijay Karan
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIJERA Editor
 
Bz32915919
Bz32915919Bz32915919
Bz32915919IJMER
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesIJERA Editor
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE IJNSA Journal
 
Mobility models for delay tolerant network a survey
Mobility models for delay tolerant network a surveyMobility models for delay tolerant network a survey
Mobility models for delay tolerant network a surveyijwmn
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location InformationIJMER
 
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc NetworksSurvey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networksdrsrinivasanvenkataramani
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...ijwmn
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...IJSRD
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEEFINALYEARSTUDENTPROJECTS
 

Semelhante a Non cooperative location privacy (20)

Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projects
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 Projects
 
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc NetworksIdentification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
Identification of Closest and Phantom Nodes in Mobile Ad Hoc Networks
 
Bz32915919
Bz32915919Bz32915919
Bz32915919
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Use of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based ServicesUse of Hidden Markov Mobility Model for Location Based Services
Use of Hidden Markov Mobility Model for Location Based Services
 
azd document
azd documentazd document
azd document
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
PROTECTING PRIVACY IN VANETs USING MIX ZONES WITH VIRTUAL PSEUDONYM CHANGE
 
Mobility models for delay tolerant network a survey
Mobility models for delay tolerant network a surveyMobility models for delay tolerant network a survey
Mobility models for delay tolerant network a survey
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc NetworksSurvey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
Survey of Security Threats and Protection Techniques in Mobile Ad Hoc Networks
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
 
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
An Efficient DTN Routing Algorithm for Automatic Crime Information Sharing fo...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Privacy preserving optimal meeting l...
 

Mais de IEEEFINALYEARPROJECTS

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...IEEEFINALYEARPROJECTS
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferIEEEFINALYEARPROJECTS
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codesIEEEFINALYEARPROJECTS
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...IEEEFINALYEARPROJECTS
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...IEEEFINALYEARPROJECTS
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsIEEEFINALYEARPROJECTS
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsIEEEFINALYEARPROJECTS
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...IEEEFINALYEARPROJECTS
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...IEEEFINALYEARPROJECTS
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeIEEEFINALYEARPROJECTS
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...IEEEFINALYEARPROJECTS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...IEEEFINALYEARPROJECTS
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationIEEEFINALYEARPROJECTS
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachIEEEFINALYEARPROJECTS
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksIEEEFINALYEARPROJECTS
 

Mais de IEEEFINALYEARPROJECTS (20)

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Spatial approximate string search
Spatial approximate string searchSpatial approximate string search
Spatial approximate string search
 

Último

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Non cooperative location privacy

  • 1. Non-Cooperative Location Privacy Abstract: In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. Self-interested mobile nodes might thus decide not to cooperate and jeopardize the achievable location privacy. In this paper, we analyze non-cooperative behaviour of mobile nodes, where each node aims at maximizing its location privacy at a minimum cost. As in practice mobile nodes do not know their opponents’ payoffs, we then consider static incomplete information. By means of numerical results, we predict behaviour of selfish mobile nodes. We then investigate dynamic games where nodes decide to change their pseudonym one after the other and show how this affects strategies at equilibrium. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. Architecture: Existing System: In contrast with existing approaches, we consider rational mobile nodes that locally decide whether to change their pseudonyms. Although selfish behaviour can reduce the cost of location privacy, it can also jeopardize the welfare achieved with a location privacy scheme. We investigate whether the multiple pseudonym approach achieves location privacy in non-cooperative scenarios. Disadvantages: The drawback of this model is that nodes may have misaligned incentives (i.e., different privacy levels) and this can lead to failed attempts to achieve location privacy. Proposed System: We propose a user-centric location privacy model that captures the evolution of the location privacy level of mobile nodes over time and helps them determine when to change pseudonyms, which model the decisions of mobile nodes in a mix zone.
  • 3. Advantages: We analyze non-cooperative behaviour of mobile nodes by using this model, where each node aims at maximizing its location privacy at a minimum cost. Algorithm: Routing Algorithm: The adversary A observes the set of n(T) nodes changing pseudonyms, where T is the time at which the pseudonym change occurs. A compares the set B of pseudonyms before the change with the set D of pseudonyms after the change and, based on the mobility of the nodes, predicts the most probable matching . Let pd|b = Pr(“Pseudonym d ∈ D corresponds to b ∈ B”), that is the probability that a new pseudonym d ∈ D corresponds to an old pseudonym b ∈ B. As is standard in the literature , the location privacy level of node i involved in a successful pseudonym change at time T is computed as the adversary’s uncertainty: Modules: 1. Location Privacy 2. User Centric Model 3. Pseudonym Change Module 1) Location Privacy: There are several techniques to mitigate the tracking of mobile nodes. We consider the use of multiple pseudonyms: over time, mobile nodes change the pseudonym to sign messages, thus reducing their long term link ability. To avoid spatial correlation of their location, mobile nodes in proximity coordinate pseudonym changes in regions called mix zones. We assume that as soon as a node changes pseudonym, the old pseudonym expires and is removed from the node’s memory. In other words, two nodes cannot use the same pseudonyms at the same time. Mix zones can also conceal the trajectory of mobile nodes to protect against the spatial correlation of location traces, e.g., by using (i) silent/encrypted mix zones (ii) regions where the adversary has no coverage . Without loss of generality, we assume silent mix zones: mobile nodes turn off their transceivers and stop sending messages for a certain period of time. If at least two nodes change pseudonyms in a silent mix zone, a mixing of their whereabouts occurs and the mix zone becomes a confusion point for the adversary.
  • 4. 2) User Centric Model: The entropy measures the location privacy achieved in specific mix zones at some point in time. However, location privacy needs of individuals vary depending on time and location. It is thus desirable to protect location privacy in a user-centric manner, such that each user can decide when and where to protect its location privacy. We consider a user- centric model of location privacy, where each mobile node locally monitors its location privacy over time. A network-wide metric could evaluate the network but might ignore that some nodes have a low location privacy level and are traceable for long distances. As a user-centric approach captures the evolution of location pri- vacy of users over time, mobile nodes can evaluate the distance over which they are potentially tracked by an adversary (i.e., the distance-to-confusion) and can act upon it by deciding whether and when to change its pseudonym. With a user-centric model, mobile nodes can request a pseudonym change from other nodes in proximity if their local location privacy level is lower than a desired level. 3) Pseudonym Change Module: We present the aspects of achieving location privacy with multiple pseudonyms in a rational environment. The key aspect is to consider costs and the potential location privacy gain when making a pseudonym change decision. Considering the cost of pseudonym and the available location privacy gain, the user-centric location privacy level might encourage selfish mobile nodes to change pseudonym and obtain a satisfactory location privacy level, as long as other nodes are also changing. Nodes may also delay their decision in order to try to find the better conditions that maximize the effectiveness of pseudonym changes. Therefore, we investigate whether location privacy can emerge in a non-cooperative system despite the cost of changing pseudonym, differentiated privacy levels, and the need for coordination to achieve a confusion point.