|
|
1 | (4) |
|
1.1 Mobile Networks: An Overview |
|
|
1 | (1) |
|
1.2 Understanding Privacy |
|
|
2 | (1) |
|
1.3 Scope and Organization of the Book |
|
|
3 | (2) |
|
|
3 | (2) |
|
2 Privacy Preservation Using Multiple Mix Zones |
|
|
5 | (26) |
|
|
5 | (3) |
|
|
8 | (1) |
|
|
9 | (2) |
|
2.3.1 Architecture Overview |
|
|
9 | (1) |
|
2.3.2 Mix Zone Implementation |
|
|
10 | (1) |
|
2.3.3 Mix Zone Effectiveness Measurement |
|
|
11 | (1) |
|
|
11 | (2) |
|
2.5 Privacy Preservation Metric |
|
|
13 | (2) |
|
|
13 | (1) |
|
|
14 | (1) |
|
2.6 Uniform Traffic Mix Zone Placement |
|
|
15 | (3) |
|
2.6.1 Problem Formulation |
|
|
15 | (1) |
|
2.6.2 Heuristic Algorithm |
|
|
16 | (2) |
|
2.7 Traffic-Aware Mix Zone Placement |
|
|
18 | (5) |
|
2.7.1 Problem Formulation |
|
|
18 | (3) |
|
2.7.2 Heuristic Algorithm |
|
|
21 | (2) |
|
2.8 Performance Evaluation |
|
|
23 | (8) |
|
|
23 | (1) |
|
2.8.2 Mobility Trace Characteristics |
|
|
23 | (1) |
|
2.8.3 Protection Effectiveness |
|
|
24 | (2) |
|
2.8.4 Resilience to Inferential Attack |
|
|
26 | (2) |
|
|
28 | (1) |
|
|
29 | (2) |
|
3 Privacy Preservation Using Game-Theoretic Approach |
|
|
31 | (20) |
|
|
31 | (2) |
|
|
33 | (1) |
|
|
34 | (3) |
|
3.3.1 System Model for Location Based Services |
|
|
34 | (1) |
|
|
35 | (1) |
|
3.3.3 Location Privacy Metric |
|
|
36 | (1) |
|
|
37 | (2) |
|
3.4.1 Dummy User Generation |
|
|
37 | (1) |
|
3.4.2 Problem Description |
|
|
38 | (1) |
|
3.5 Dummy User Generation Game |
|
|
39 | (4) |
|
|
39 | (2) |
|
3.5.2 Bayesian Nash Equilibrium of DUG Game |
|
|
41 | (2) |
|
3.6 Timing-Aware Dummy User Generation Game |
|
|
43 | (2) |
|
3.6.1 Extension to DUG Game |
|
|
43 | (1) |
|
3.6.2 Bayesian Nash Equilibrium of T-DUG Game |
|
|
44 | (1) |
|
3.7 A Distributed Algorithm for Strategy Optimization |
|
|
45 | (1) |
|
3.8 Performance Evaluation |
|
|
46 | (5) |
|
3.8.1 Analysis of Data Trace |
|
|
47 | (1) |
|
|
47 | (2) |
|
|
49 | (2) |
|
4 Privacy Preservation Using Logical Coordinates |
|
|
51 | (22) |
|
|
51 | (2) |
|
|
53 | (2) |
|
4.2.1 Data Source Privacy |
|
|
53 | (1) |
|
|
53 | (1) |
|
4.2.3 Energy Efficient Routing |
|
|
54 | (1) |
|
4.3 Network and Adversary Model |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
4.3.3 Privacy Protection Goal |
|
|
56 | (1) |
|
4.4 SinkTrail Protocol Design |
|
|
56 | (7) |
|
4.4.1 SinkTrail Protocol with One Mobile Sink |
|
|
56 | (5) |
|
4.4.2 SinkTrail Protocol with Multiple Mobile Sinks |
|
|
61 | (1) |
|
4.4.3 SinkTrail-S Protocol |
|
|
62 | (1) |
|
4.5 Performance Evaluation |
|
|
63 | (10) |
|
|
64 | (1) |
|
4.5.2 Communication Cost Analysis |
|
|
65 | (3) |
|
|
68 | (2) |
|
|
70 | (3) |
|
5 Conclusion and Future Directions |
|
|
73 | |
|
|
73 | (1) |
|
|
74 | |