A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks

Mobile traces, collected by vehicular sensor networks (VSNs), facilitate various business applications and services. However, the traces can be used to trace and identify drivers or passengers, which raise significant privacy concerns. Existing privacy protecting techniques may not be suitable, due...

Full description

Saved in:
Bibliographic Details
Main Authors: Yunhua He, Limin Sun, Weidong Yang, Hong Li
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2014/838391
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832559089848156160
author Yunhua He
Limin Sun
Weidong Yang
Hong Li
author_facet Yunhua He
Limin Sun
Weidong Yang
Hong Li
author_sort Yunhua He
collection DOAJ
description Mobile traces, collected by vehicular sensor networks (VSNs), facilitate various business applications and services. However, the traces can be used to trace and identify drivers or passengers, which raise significant privacy concerns. Existing privacy protecting techniques may not be suitable, due to their inadequate considerations for the data accuracy requirements of different applications and the adversary's knowledge and strategies. In this paper, we analyze data privacy issues in VSNs with a game theoretic model, where a defender uses the privacy protecting techniques against the attack strategies implemented by an adversary. We study both the passive and active attack scenarios, and in each scenario we consider the effect of different data accuracy requirements on the performance of defense measures. Through the analysis results on real-world traffic data, we show that more inserted bogus traces or deleted recorded samples show a better performance when the cost of defense measures is small, whereas doing nothing becomes the best strategy when the cost of defense measures is very large. In addition, we present the optimal defense strategy that provides the defender with the maximum utility when the adversary implements the optimal attack strategy.
format Article
id doaj-art-9d96d4d0a63b45138968bd5897a29609
institution Kabale University
issn 1550-1477
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj-art-9d96d4d0a63b45138968bd5897a296092025-02-03T01:30:50ZengWileyInternational Journal of Distributed Sensor Networks1550-14772014-01-011010.1155/2014/838391838391A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor NetworksYunhua He0Limin Sun1Weidong Yang2Hong Li3 School of Computer Science, Xidian University, Xi'an, China State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Science, Beijing, China College of Information Science and Engineering, Henan University of Technology, Zhengzhou, China State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Science, Beijing, ChinaMobile traces, collected by vehicular sensor networks (VSNs), facilitate various business applications and services. However, the traces can be used to trace and identify drivers or passengers, which raise significant privacy concerns. Existing privacy protecting techniques may not be suitable, due to their inadequate considerations for the data accuracy requirements of different applications and the adversary's knowledge and strategies. In this paper, we analyze data privacy issues in VSNs with a game theoretic model, where a defender uses the privacy protecting techniques against the attack strategies implemented by an adversary. We study both the passive and active attack scenarios, and in each scenario we consider the effect of different data accuracy requirements on the performance of defense measures. Through the analysis results on real-world traffic data, we show that more inserted bogus traces or deleted recorded samples show a better performance when the cost of defense measures is small, whereas doing nothing becomes the best strategy when the cost of defense measures is very large. In addition, we present the optimal defense strategy that provides the defender with the maximum utility when the adversary implements the optimal attack strategy.https://doi.org/10.1155/2014/838391
spellingShingle Yunhua He
Limin Sun
Weidong Yang
Hong Li
A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
International Journal of Distributed Sensor Networks
title A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
title_full A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
title_fullStr A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
title_full_unstemmed A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
title_short A Game Theory-Based Analysis of Data Privacy in Vehicular Sensor Networks
title_sort game theory based analysis of data privacy in vehicular sensor networks
url https://doi.org/10.1155/2014/838391
work_keys_str_mv AT yunhuahe agametheorybasedanalysisofdataprivacyinvehicularsensornetworks
AT liminsun agametheorybasedanalysisofdataprivacyinvehicularsensornetworks
AT weidongyang agametheorybasedanalysisofdataprivacyinvehicularsensornetworks
AT hongli agametheorybasedanalysisofdataprivacyinvehicularsensornetworks
AT yunhuahe gametheorybasedanalysisofdataprivacyinvehicularsensornetworks
AT liminsun gametheorybasedanalysisofdataprivacyinvehicularsensornetworks
AT weidongyang gametheorybasedanalysisofdataprivacyinvehicularsensornetworks
AT hongli gametheorybasedanalysisofdataprivacyinvehicularsensornetworks