A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
On non-cooperative location privacy
2009
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication. A frequently proposed solution to protect location privacy suggests that mobile nodes collectively change their pseudonyms in regions called mix zones. Because this approach is costly, self-interested mobile nodes might decide not to cooperate and could thus jeopardize the achievable
doi:10.1145/1653662.1653702
dblp:conf/ccs/FreudigerMHP09
fatcat:6ym62k34svabznb43zao2y6rxm