Atjaunināt sīkdatņu piekrišanu

Location Privacy Protection in Mobile Networks 2013 ed. [Mīkstie vāki]

  • Formāts: Paperback / softback, 75 pages, height x width: 235x155 mm, weight: 1474 g, 23 Illustrations, black and white; XII, 75 p. 23 illus., 1 Paperback / softback
  • Sērija : SpringerBriefs in Computer Science
  • Izdošanas datums: 17-Oct-2013
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1461490731
  • ISBN-13: 9781461490739
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 75 pages, height x width: 235x155 mm, weight: 1474 g, 23 Illustrations, black and white; XII, 75 p. 23 illus., 1 Paperback / softback
  • Sērija : SpringerBriefs in Computer Science
  • Izdošanas datums: 17-Oct-2013
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1461490731
  • ISBN-13: 9781461490739
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection.

This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.
1 Introduction
1(4)
1.1 Mobile Networks: An Overview
1(1)
1.2 Understanding Privacy
2(1)
1.3 Scope and Organization of the Book
3(2)
References
3(2)
2 Privacy Preservation Using Multiple Mix Zones
5(26)
2.1 Overview
5(3)
2.2 Related Work
8(1)
2.3 System Model
9(2)
2.3.1 Architecture Overview
9(1)
2.3.2 Mix Zone Implementation
10(1)
2.3.3 Mix Zone Effectiveness Measurement
11(1)
2.4 Threat Model
11(2)
2.5 Privacy Preservation Metric
13(2)
2.5.1 Graph Model
13(1)
2.5.2 Privacy Metric
14(1)
2.6 Uniform Traffic Mix Zone Placement
15(3)
2.6.1 Problem Formulation
15(1)
2.6.2 Heuristic Algorithm
16(2)
2.7 Traffic-Aware Mix Zone Placement
18(5)
2.7.1 Problem Formulation
18(3)
2.7.2 Heuristic Algorithm
21(2)
2.8 Performance Evaluation
23(8)
2.8.1 Simulation Setup
23(1)
2.8.2 Mobility Trace Characteristics
23(1)
2.8.3 Protection Effectiveness
24(2)
2.8.4 Resilience to Inferential Attack
26(2)
2.8.5 Complexity
28(1)
References
29(2)
3 Privacy Preservation Using Game-Theoretic Approach
31(20)
3.1 Overview
31(2)
3.2 Related Work
33(1)
3.3 Preliminaries
34(3)
3.3.1 System Model for Location Based Services
34(1)
3.3.2 Threat Model
35(1)
3.3.3 Location Privacy Metric
36(1)
3.4 Problem Statement
37(2)
3.4.1 Dummy User Generation
37(1)
3.4.2 Problem Description
38(1)
3.5 Dummy User Generation Game
39(4)
3.5.1 Game Model
39(2)
3.5.2 Bayesian Nash Equilibrium of DUG Game
41(2)
3.6 Timing-Aware Dummy User Generation Game
43(2)
3.6.1 Extension to DUG Game
43(1)
3.6.2 Bayesian Nash Equilibrium of T-DUG Game
44(1)
3.7 A Distributed Algorithm for Strategy Optimization
45(1)
3.8 Performance Evaluation
46(5)
3.8.1 Analysis of Data Trace
47(1)
3.8.2 Results
47(2)
References
49(2)
4 Privacy Preservation Using Logical Coordinates
51(22)
4.1 Overview
51(2)
4.2 Related Work
53(2)
4.2.1 Data Source Privacy
53(1)
4.2.2 Data Sink Privacy
53(1)
4.2.3 Energy Efficient Routing
54(1)
4.3 Network and Adversary Model
55(1)
4.3.1 Network Model
55(1)
4.3.2 Adversary Model
56(1)
4.3.3 Privacy Protection Goal
56(1)
4.4 SinkTrail Protocol Design
56(7)
4.4.1 SinkTrail Protocol with One Mobile Sink
56(5)
4.4.2 SinkTrail Protocol with Multiple Mobile Sinks
61(1)
4.4.3 SinkTrail-S Protocol
62(1)
4.5 Performance Evaluation
63(10)
4.5.1 Privacy Protection
64(1)
4.5.2 Communication Cost Analysis
65(3)
4.5.3 Simulation Results
68(2)
References
70(3)
5 Conclusion and Future Directions
73
5.1 Summary
73(1)
5.2 Future Directions
74