ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2014, Vol. 51 ›› Issue (11): 2483-2492.doi: 10.7544/issn1000-1239.2014.20131074

Previous Articles     Next Articles

Privacy Preserving for Node Trajectory in VSN: A Game-Theoretic Analysis Based Approach

He Yunhua1, Sun Limin1,2, Yang Weidong2,3, Li Zhi2, Li Hong2   

  1. 1(School of Computer Science and Technology, Xidian University, Xi’an 710071); 2(State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences), Beijing 100093); 3(College of Information Science and Engineering, Henan University of Technology, Zhengzhou 450001)
  • Online:2014-11-01

Abstract: By using crowdsourcing, vehicular sensor networks (VSN) are considered essential for achieving automatic and dynamic traffic information collection, and have created various fresh new business applications and services in our daily lives. However, the published trajectories that collected in VSNs raise significant privacy concerns. These existing methods, such as anonymization and cloaking techniques, though they are attractive for providing strong privacy guarantees, generally fail to satisfy the accuracy requirements of the trajectory data based applications. In addition, different attack strategies will result in quite different performance under various privacy preserving strategies. In order to address these challenges, we present a location privacy protection method, the DefenseGame algorithm. Given a set of trajectories and a probability density function for side information, the algorithm can assist the defender in selecting the optimal defense strategies by calculating the equilibriums in attack and defense games. In the attack and defense game, we use a game-theoretic model to capture the behavior of the adversary and defender, and we show the effectiveness of the two kinds of defense strategies in the adversary’s inference attacks. Our experimental results indicate that the same defense strategy shows different performance for attack strategies and the proposed algorithm can help to obtain higher defender’s utility compared with other approaches.

Key words: vehicular sensor network (VSN), trace privacy, game theory, optimal defense strategies, equilibrium

CLC Number: