Modeling cooperative, selfish and malicious behaviors for trajectory privacy preservation using Bayesian game theory

13Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

As new mobile Wireless Sensor Networks (mWSNs) for location-aware applications are emerging, trajectory privacy invasion is becoming an indispensable issue. Many promising techniques are under development. Considering the decentralized network architecture, most of Trajectory Privacy Preservation (TPP) techniques rely on the cooperation from peer nodes, cluster headers, or a third party. However, only a few works have addressed the issue of selfish behaviors in such cooperation required techniques. Nevertheless, the problem of facing selfish and compromised nodes in the noncooperative and hostile environment is rarely touched. In this paper, we apply Bayesian game theory to model cooperative, selfish and malicious behaviors of autonomous mobile nodes in decentralized mWSNs. We formulate and analyze the TPP game among peer nodes in both strategic and dynamic forms. The equilibrium strategies for users to evaluate the degree of trust in participating in in-network TPP activities are provided and analyzed in theoretical and simulation results. © 2013 IEEE.

Cite

CITATION STYLE

APA

Jin, X., Pissinou, N., Pumpichet, S., Kamhoua, C. A., & Kwiat, K. (2013). Modeling cooperative, selfish and malicious behaviors for trajectory privacy preservation using Bayesian game theory. In Proceedings - Conference on Local Computer Networks, LCN (pp. 835–842). IEEE Computer Society. https://doi.org/10.1109/LCN.2013.6761339

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free