Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Research in Computer Security and Privacy: Emerging Trends
Guest editors: Vijay AtluriGuest Editor and Claudia DiazGuest Editor
Article type: Research Article
Authors: Jadliwala, Murtuzaa; * | Bilogrevic, Igorb | Hubaux, Jean-Pierreb
Affiliations: [a] Wichita State University, Wichita, KS, USA. E-mail: murtuza.jadliwala@wichita.edu | [b] LCA1, EPFL, Lausanne, Switzerland. E-mails: Igor.Bilogrevic@epfl.ch, Jean-Pierre.Hubaux@epfl.ch
Correspondence: [*] Corresponding author: Murtuza Jadliwala, Wichita State University, Wichita, KS 67226, USA. E-mail: murtuza.jadliwala@wichita.edu
Note: [1] An earlier version of this paper titled “Optimizing mixing in pervasive networks: A graph-theoretic perspective” appeared in the Proceedings of the 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12–14, 2011.
Abstract: Location privacy is a major concern in pervasive networks where static device identifiers enable malicious eavesdroppers to continuously track users and their movements. In order to prevent such identifier-based tracking, devices could coordinate regular identifier change operations in special areas called mix-zones. Although mix-zones provide spatio-temporal de-correlation between old and new identifiers, depending on the position of the mix-zone, identifier changes can generate a substantial inconvenience (or “cost”) to the users in terms of lost communications and increased energy consumption. In this paper, we address this trade-off between privacy and cost by studying the problem of determining an optimal set of mix-zones such that the degree of mixing in the network is maximized and the overall network-wide mixing cost is minimized. We follow a graph-theoretic approach and model the optimal mixing problem as a generalization of the vertex cover problem, called the Mix Cover (MC) problem. We propose three approximation algorithms for the MC problem and derive a lower bound on the solution quality guaranteed by them. Additionally, we outline two other heuristics for solving the MC problem. These heuristics are simple, but do not provide any guarantees on the solution quality. By means of extensive empirical evaluation using real data, we compare the performance and solution quality of these algorithms. The combinatorics-based approach used in this work enables us to study the feasibility of determining optimal mix-zones regularly and under dynamic network conditions.
Keywords: Mix-zones, location privacy, pervasive networks
DOI: 10.3233/JCS-130465
Journal: Journal of Computer Security, vol. 21, no. 3, pp. 317-346, 2013
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl