期刊文献+

基于博弈分析的众包交通监测隐私保护机制 被引量:6

Enhancing Privacy Preserving for Crowdsourced Monitoring——A Game Theoretic Analysis Based Approach
下载PDF
导出
摘要 众包交通监测利用移动终端上传的GPS位置信息实时感知交通状况,具有广阔的应用前景。然而,上传的GPS信息会泄露用户隐私。该文基于博弈论分析用户上传行为,提出隐私保护的优化上传机制。首先建立用户上传行为与路况服务质量和隐私泄露之间的关系,据此构建不完全信息博弈模型,以便分析用户上传行为;然后,根据用户上传博弈纳什均衡,提出用户终端可控的隐私保护优化上传机制。理论分析表明,该文提出的上传机制最大化用户效用,具有激励相容特性;通过真实数据实验验证,上传机制能够提高用户的隐私保护度,以及算法的激励相容特性。 Crowdsourcing traffic monitoring is a promising application, which exploits ubiquitous mobile devices to upload GPS samples to obtain live road traffic. However, uploading the sensitive location information raises significant privacy issues. By analyzing the upload behavior of mobile users, this paper designs a privacy preserving traffic data collection mechanism. Using the relationships among the traffic service quality, privacy loss and the upload behavior, an incomplete information game is built to analyze the upload behavior of users. Based on the existence and uniqueness of Nash equilibrium in this game, a user-centric privacy preserving traffic data collection mechanism is proposed, which can maximize the utilities of users, and this mechanism has a feature of incentive compatible. Finally, the experimental results on real world traffic data confirm the effectiveness of privacy protecting and the feature of incentive compatible.
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第2期340-346,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61472418 61202099) 中国科学院先导专项基金(XDA06040100)~~
关键词 众包监测 位置隐私 不完全信息博弈 均衡 Crowdsourced monitoring Location privacy Incomplete information game Equilibrium
  • 相关文献

参考文献17

  • 1YANG D J, XUE G L, FANG X, et al. Incentive mechanisms for crowdsensing: crowdsourcing with smartphones[J]. IEEE/ A CM Transactions on Networking, 2015, 99: 1-13.
  • 2GAO S, MA J F, SHI W S, et al. TrPF: A trafectory privacy-preserving framework for participatory sensing[J]. IEEE Transactions on Information Forensics and Security, 2013, 8(6): 874-887.
  • 3MOHAN P, PADMANABHAN V N, and RAMJEE R. Nericelh rich monitoring of road and traffic conditions using mobile smartphones[C]. Proceedings of the ACM Conference on Embedded Networked Sensor Systems, North Carolina, 2008: 323-336.
  • 4MONTJOYE Y A, HIDALGO C A, VERLEYSEN M, et al. Unique in the crowd: The privacy bounds of human mobility[R]. Nature Science Report, Cambridge, 2013.
  • 5CHRIS M, DAVID Y, and NUNG Y. Privacy vulnerability of published anonymous mobility traces[J]. IEEE Transactions on Networking, 2013, 21(3): 720-733.
  • 6孙利民,李红,王笑寒,等.物联网位置隐私保护综述[J].软件学报,2014,25(s1):1-10.
  • 7SHI E, CHANT H, RIEFFEL E, et al. Privacy-preserving aggregation of time-series data[C]. Proceedings of 18th Network & Distributed System Security Symposium, California, 2011: 1-17.
  • 8HOH B, GRUTESER M, XIONG H, et al. Achieving guaranteed anonymity in gps traces via uncertainty-aware path cloaking [J]. IEEE Transactions on Mobile Computing, 2010, 9(8): 1089-1107.
  • 9PALANISAMY B and LIU L. Attack-resilient mix-zones over road networks: architecture and algorithms[J]. IEEE Transactions on Mobile Computing, 2015, 14(3): 495-508.
  • 10LIU X X, ZHAO H, PAN M, et al. Traffic-aware multiple mix zone placement for protecting location privacy[C]. Proceedings of the 31rd Annual IEEE International Conference oa Computer Communications, Florida, 2012: 972-980.

二级参考文献30

  • 1Gupta P and Kumar P. The capacity of wireless networks[J]. IEEE Transactions on Information Theory, 2000, 46(2): 388-404.
  • 2Wyner A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
  • 3Liu R, Maric I, Spasojevic P, et al.. Discrete memoryless interference and broadcast channels with confidential messages: secrecy rate regions[J]. IEEE Transactions on Information Theory, 2008, 54(6): 2493-2507.
  • 4Jorswieck E, Lai Li-feng, Ma Wing-kin. Signal processing for wireless physical layer security[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1657-1659.
  • 5Marano S and Matta V. Achieving perfect secrecy by pdf- bandlimited jamming[J]. IEEE Signal Processing Letters, 2014, 21(1): 83-87.
  • 6Liu B, Zhang L, and Xin X. Physical layer security in OFDM- PON based on dimension-transformed chaotic permutation[J] IEEE Photonics Technology Letters, 2014, 26(2): 127-130.
  • 7Lin P H, Lai S H, and Lin S C. On secrecy rate of the generalized artificial-Noise assisted secure beamforming for wiretap channels[J]. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 1728-1740.
  • 8Zhang Rong-qing and Song Ling-yang. Physical layer security for two-way untrusted relaying with friendly jammers[J]. IEEE Transactions on Vehicular Technology, 2012, 61(8): 3693-3704.
  • 9Manzoor A K, Hamidou T, and Athanasios V. Evolutionary coalitional games: design and chMlenges in wireless networks[J]. IEEE Wireless Communications, 2012, 19(2): 50-56.
  • 10Walid S, Zhang Xiang-yun, and Behrouz M. Tree formation with physical layer security considerations in wireless multi-hop networks[J]. IEEE Transactions on Wireless Communications, 2012, 11(11): 3980-3991. 3, 2012.

共引文献24

同被引文献88

引证文献6

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部