420 likes | 648 Views
On Non- Cooperative Location Privacy : A Game- theoreticAnalysis. CCS 2009. Julien Freudiger , Mohammad Hossein Manshaei , and Jean-Pierre Hubaux. David C. Parkes. Pervasive Wireless Networks. Vehicular networks. Mobile Social networks . Human sensors. Personal WiFi bubble.
E N D
On Non-Cooperative Location Privacy: A Game-theoreticAnalysis CCS 2009 Julien Freudiger, Mohammad Hossein Manshaei, and Jean-Pierre Hubaux David C. Parkes
Pervasive Wireless Networks Vehicular networks Mobile Social networks Human sensors Personal WiFi bubble
Peer-to-Peer Communications WiFi/Bluetooth enabled 1 2 Identifier Message Signature || Certificate
Location Privacy Problem Passive adversary monitors identifiers used in peer-to-peer communications 1 13h00: Lunch 11h00: Art Institute 10h00: Millenium Park
Previous Work Message Pseudonym • Pseudonymity is not enough for location privacy [1, 2] • Removing pseudonyms is not enough either [3] Spatio-Temporal correlation of traces Identifier Message [1] P. Golle and K. Partridge. On the Anonymity of Home/Work Location Pairs. Pervasive Computing, 2009 [2] B. Hoh et al. Enhancing Security & Privacy in Traffic Monitoring Systems. Pervasive Computing, 2006 [3] B. Hoh and M. Gruteser. Protecting location privacy through path confusion. SECURECOMM, 2005
Location Privacy with Mix Zones • Spatial decorrelation: Remain silent Temporal decorrelation: Change pseudonym ? y 1 1 x 2 2 Mix zone Why should a node participate? [1] A. Beresford and F. Stajano. Mix Zones: user privacy in location aware services. Percom, 2004
Mix Zone Privacy Gain B D 1 x 2 y t- t=T Number of nodes in mix zone
Cost caused by Mix Zones • Turn off transceiver • Routing is difficult • Load authenticated pseudonyms + + =
Problem Tension between costand benefit of mix zones When should nodes change pseudonym?
Method Rational Behavior Selfishoptimization Security protocols Multi-party computations • Game theory • Evaluate strategies • Predict evolution of security/privacy • Example • Cryptography • Revocation • Privacymechanisms
Outline • User-centric Model • Pseudonym Change Game • Results
Mix Zone Establishment • In pre-determined regions [1] • Dynamically [2] • Distributed protocol [1] A. Beresford and F. Stajano. Mix Zones: user privacy in location aware services. PercomW, 2004 [2] M. Li et al. Swing and Swap: User-centric approaches towards maximizing location privacy . WPES, 2006
User-Centric Location Privacy Model Privacy = Ai(T) – PrivacyLoss Privacy Ai(T1) Ai(T2) t Traceable
Pros/Cons of user-centric Model • Pro • Control when/where to protect your privacy • Con • Misaligned incentives
Outline • User-centric Model • Pseudonym Change Game • Results
Assumptions Pseudonym Change game • Simultaneous decision • Players want to maximize their payoff • Consider privacy upperboundAi(T) = log2(n(t)) 2 1
Game Model • Players • Mobile nodes in transmission range • There is a game iif • Strategy • Cooperate (C) : Change pseudonym • Defect (D): Do not change pseudonym
C D C Pseudonym Change Game 3 2 1 t t1 Silent period
Payoff Function • ui = privacy - cost If C & Not alone, then ui = Ai(T)- γ If C & Alone, then ui = ui-- γ If D, then ui = ui-
Sequence of Pseudonym Change Games E1 1 4 ui 3 2 Ai(T1)- γ E2 Ai(T2)- γ 5 6 7 C3 γ 8 E3 E1 9 E2
Outline • User-centric Model • Pseudonym Change Game • Results
C-Game Complete information Each player knows the payoff of its opponents
2-Player C-Game Two pure-strategy Nash Equilibria (NE): (C,C)&(D,D) One mixed-strategy NE
Best Response Correspondence 1 mixed-strategy NE 2 pure-strategy NE
n-Player C-Game • All Defection is always a NE • A NE with cooperation exists iif there is a group of k users with • Theorem • The static n-player pseudonym change C-game has • at least 1 and at most 2 pure strategy Nash equilibria. in the group of k nodes
C-Game Results Result 1: high coordination among nodes at NE • Change pseudonyms only when necessary • Otherwise defect
I-Game Incomplete information Players don’t know the payoff of their opponents
Bayesian Game Theory Define type of playerθi = ui- • Predict action of opponents based on pdf over type
Environment Lowprivacy Middle privacy High privacy
Threshold Strategy • A threshold determines players’ action • Probability of cooperation is θi D ~ θi C t
2-Player I-Game Bayesian NE ~ Find threshold θi* such that Average utility of cooperation = Average utility of defection
Result 4: A large number of nodes n provides incentive not to cooperate
Conclusion Rational behavior in location privacy protocol • Propose a user-centric model of location privacy • Introduce Pseudonym Change game • Derive existence of equilibrium strategies • Evaluate effect of non-cooperative behavior Outcome: Protocol for distributed pseudonym changes among rational nodes Future: Evaluate performance of protocol
Payoff Function If , then C If , then If , then D where the payoff function at the time immediately prior to the strategy of the opponents of i the number of cooperating nodes besides i
Best Response Correspondence 1 mixed-strategy NE 2 pure-strategy NE
Type • Incomplete information =>imperfect information [1] • Type captures the private information of players • Assume type is distributed with probability known to all players • Each player can predict the behavior of its opponents with Bayesian Game Theory [1] J. Harsanyi. Games with Incomplete Information Played by Bayesian Players . Management Science , 1967