Proceedings of International Conference On Global Innovations In Computing Technology (ICGICT'14)

2014 
Mobile network consists of number of mobile nodes moving in the network randomly, In mobile networks authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. This approach is costly. Self interested mobile nodes might, thus, decide not to cooperate and jeopardize the achievable location privacy. To analyze non-cooperative behavior of mobile nodes by using a game-theoretic model, where each player aims at maximizing its location privacy at a minimum cost. We obtain Nash equilibria in static n-player complete information games. As in practice mobile nodes do not know their opponents' payoffs, we then consider static incomplete information games. To establish that symmetric Bayesian-Nash equilibria exist with simple threshold strategies. By means of numerical results, we predict behavior of selfish mobile nodes. We then investigate dynamic games where players decide to change their pseudonym one after the other and show how this affects strategies at equilibrium. Finally, we design protocols—Pseudo Game protocols—based on the results of our analysis and simulate their performance in vehicular network scenarios, The pseudonyms key changes mainly used in many areas such as peer to peer communication and wireless network, because this network only each time change the location .Public and private key is used for transferring the information, number of routing algorithm is used for route the information. KEYWORDS—Security and privacy protection, mobile computing, network protocols I. INTRODUCTION The mobile nodes are frequently changing their location, while change the location privacy of the mobile node is very important. The growing popularity of Bluetooth, WiFi in ad hoc mode, and other similar techniques is likely to fuel the adoption of peer-to-peer wireless communications. Corporations are developing wireless peer-to-peer technologies. The integration of peer-to-peer wireless communications into mobile devices brings new security challenges, due to their mobile and ad hoc nature. Wireless communications are inherently dependent on geographic proximity: Mobile devices detect each other's presence by periodically broadcasting beacon messages. These messages include pseudonyms such as public keys in order to identify communicating parties, route communications and secure communications. A change of pseudonym by an isolated device in a wireless network can be trivially identified by an external party observing transmitted messages. Hence, a change of pseudonym should be spatially and temporally coordinated among mobile devices , i.e., a collective effort. One solution consists in changing pseudonyms periodically, at a predetermined frequency. This works if at least two mobile nodes change their pseudonyms in proximity, a rarely met condition. Base stations can be used as coordinators to synchronize pseudonym changes but this solution requires help from the infrastructure. The approach in enables mobile nodes to change their pseudonyms at specific time instances (e.g., before associating with wireless base stations). However, this solution achieves location privacy only with respect to the infrastructure. Another approach coordinates pseudonym changes by forcing mobile nodes to change their pseudonyms within predetermined regions called mix zones. This approach lacks flexibility and is prone to attacks because a central authority fixes mix zone locations and must share them with mobile nodes.
    • Correction
    • Cite
    • Save
    • Machine Reading By IdeaReader
    7
    References
    0
    Citations
    NaN
    KQI
    []