Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
The vulnerability of published vehicle traces is a focus issue for vehicle ad hoc network. Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. Also ability of an...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.032/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539819134517248 |
---|---|
author | Wei-dong YANG Yun-hua HE Li-min SUN |
author_facet | Wei-dong YANG Yun-hua HE Li-min SUN |
author_sort | Wei-dong YANG |
collection | DOAJ |
description | The vulnerability of published vehicle traces is a focus issue for vehicle ad hoc network. Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. Also ability of an adversary and the goal that a defender wants to achieve by the information entropy were quantified. By the analysis of true traces, the Nash equilibrium point under the game of complete information and an optimal defense strategy providing the user with the best privacy level for each at-tack strategy were presented. |
format | Article |
id | doaj-art-89afa3a9fc38423e8c87bd9b17f17aac |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2013-08-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-89afa3a9fc38423e8c87bd9b17f17aac2025-01-14T06:42:02ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-08-013424024559677542Attack-defense game model of node traces privacy preserving for vehicle ad hoc networksWei-dong YANGYun-hua HELi-min SUNThe vulnerability of published vehicle traces is a focus issue for vehicle ad hoc network. Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. Also ability of an adversary and the goal that a defender wants to achieve by the information entropy were quantified. By the analysis of true traces, the Nash equilibrium point under the game of complete information and an optimal defense strategy providing the user with the best privacy level for each at-tack strategy were presented.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.032/vehicular ad-hoc networkstraceprivacy preservinggame theory |
spellingShingle | Wei-dong YANG Yun-hua HE Li-min SUN Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks Tongxin xuebao vehicular ad-hoc networks trace privacy preserving game theory |
title | Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks |
title_full | Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks |
title_fullStr | Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks |
title_full_unstemmed | Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks |
title_short | Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks |
title_sort | attack defense game model of node traces privacy preserving for vehicle ad hoc networks |
topic | vehicular ad-hoc networks trace privacy preserving game theory |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.032/ |
work_keys_str_mv | AT weidongyang attackdefensegamemodelofnodetracesprivacypreservingforvehicleadhocnetworks AT yunhuahe attackdefensegamemodelofnodetracesprivacypreservingforvehicleadhocnetworks AT liminsun attackdefensegamemodelofnodetracesprivacypreservingforvehicleadhocnetworks |