Location Privacy in Pervasive Computing
IEEE Pervasive Computing
Mix Zones: User Privacy in Location-aware Services
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
Enhancing Security and Privacy in Traffic-Monitoring Systems
IEEE Pervasive Computing
Swing & swap: user-centric approaches towards maximizing location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Improving wireless privacy with an identifier-free link layer protocol
Proceedings of the 6th international conference on Mobile systems, applications, and services
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
A class of mean field interaction models for computer and communication systems
Performance Evaluation
The age of gossip: spatial mean field regime
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
Transient-based identification of wireless sensor nodes
IPSN '09 Proceedings of the 2009 International Conference on Information Processing in Sensor Networks
On non-cooperative location privacy: a game-theoretic analysis
Proceedings of the 16th ACM conference on Computer and communications security
Inference attacks on location tracks
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Towards an information theoretic metric for anonymity
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
On the effectiveness of changing pseudonyms to provide location privacy in VANETS
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Towards modeling wireless location privacy
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Improved access control mechanism in vehicular ad hoc networks
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Evaluating the privacy risk of location-based services
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Cooperative pseudonym change scheme based on the number of neighbors in VANETs
Journal of Network and Computer Applications
Hi-index | 0.00 |
In many envisioned mobile ad hoc networks, nodes are expected to periodically beacon to advertise their presence. In this way, they can receive messages addressed to them or participate in routing operations. Yet, these beacons leak information about the nodes and thus hamper their privacy. A classic remedy consists in each node making use of (certified) pseudonyms and changing its pseudonym in specific locations called mix zones. Of course, privacy is then higher if the pseudonyms are short-lived (i.e., nodes have a short distance to confusion), but pseudonyms can be costly, as they are usually obtained from an external authority. In this paper, we provide a detailed analytical evaluation of the age of pseudonyms based on differential equations. We corroborate this model by a set of simulations. This paper thus provides a detailed quantitative framework for selecting the parameters of a pseudonym-based privacy system in peer-to-peer wireless networks.