Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks

The vulnerability of published vehicle traces is a focus issue for vehicle ad hoc network. Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. Also ability of an...

Full description

Saved in:
Bibliographic Details
Main Authors: Wei-dong YANG, Yun-hua HE, Li-min SUN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.032/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539819134517248
author Wei-dong YANG
Yun-hua HE
Li-min SUN
author_facet Wei-dong YANG
Yun-hua HE
Li-min SUN
author_sort Wei-dong YANG
collection DOAJ
description The vulnerability of published vehicle traces is a focus issue for vehicle ad hoc network. Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. Also ability of an adversary and the goal that a defender wants to achieve by the information entropy were quantified. By the analysis of true traces, the Nash equilibrium point under the game of complete information and an optimal defense strategy providing the user with the best privacy level for each at-tack strategy were presented.
format Article
id doaj-art-89afa3a9fc38423e8c87bd9b17f17aac
institution Kabale University
issn 1000-436X
language zho
publishDate 2013-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-89afa3a9fc38423e8c87bd9b17f17aac2025-01-14T06:42:02ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-08-013424024559677542Attack-defense game model of node traces privacy preserving for vehicle ad hoc networksWei-dong YANGYun-hua HELi-min SUNThe vulnerability of published vehicle traces is a focus issue for vehicle ad hoc network. Aiming at the privacy of published traces with a game-theoretic model under the scene of the active attacks and defense actions were modeled, and the attack and defense games were analyzed. Also ability of an adversary and the goal that a defender wants to achieve by the information entropy were quantified. By the analysis of true traces, the Nash equilibrium point under the game of complete information and an optimal defense strategy providing the user with the best privacy level for each at-tack strategy were presented.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.032/vehicular ad-hoc networkstraceprivacy preservinggame theory
spellingShingle Wei-dong YANG
Yun-hua HE
Li-min SUN
Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
Tongxin xuebao
vehicular ad-hoc networks
trace
privacy preserving
game theory
title Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
title_full Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
title_fullStr Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
title_full_unstemmed Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
title_short Attack-defense game model of node traces privacy preserving for vehicle ad hoc networks
title_sort attack defense game model of node traces privacy preserving for vehicle ad hoc networks
topic vehicular ad-hoc networks
trace
privacy preserving
game theory
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.032/
work_keys_str_mv AT weidongyang attackdefensegamemodelofnodetracesprivacypreservingforvehicleadhocnetworks
AT yunhuahe attackdefensegamemodelofnodetracesprivacypreservingforvehicleadhocnetworks
AT liminsun attackdefensegamemodelofnodetracesprivacypreservingforvehicleadhocnetworks