Presentation is loading. Please wait.

Presentation is loading. Please wait.

On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks Maxim …...…. Raya Reza …….…. Shokri Jean-Pierre..Hubaux LCA1, EPFL, Switzerland The.

Similar presentations


Presentation on theme: "On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks Maxim …...…. Raya Reza …….…. Shokri Jean-Pierre..Hubaux LCA1, EPFL, Switzerland The."— Presentation transcript:

1 On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks Maxim …...…. Raya Reza …….…. Shokri Jean-Pierre..Hubaux LCA1, EPFL, Switzerland The Third ACM Conference on Wireless Network Security (WiSec‘10) March 2010 Hoboken, NJ, USA

2 The Trust-Privacy Tradeoff Entity-centric trust Trust is built in each entity The cost is reduced privacy Data-centric trust Trust is built in the data Entities can keep privacy 2 privacy security privacy

3 The Dilemma of Data-Centric Trust Data increasingly comes from multiple sources Mobile devices reflect their users’ preferences and hence characterize them 3 Ephemeral network Users are not fully hidden behind their data! More contributions = More accurate trust

4 The Privacy-Preserving Gene Building data-centric trust is a collective effort Users might lose some of their privacy What if entities are privacy-preserving? A privacy-preserving entity maximizes its privacy Game theory: A selfish entity optimizes its utility Privacy-preservation = Selfishness 4 How to build data-centric trust in ephemeral networks with privacy-preserving entities?

5 Example: VANET CA pre-establishes credentials offline Entities communicate attributes (e.g., credentials, location) Communication is sequential There are deadlines on making decisions Benign entities disseminate truthful info Adversaries disseminate false info 5

6 Trust-Privacy Games Problem: privacy-preserving entities building data-centric trust in the presence of privacy-preserving attackers Game theory can help by modeling situations where the decisions of players affect each other Attacker-Defender Game G AD Trust Contribution Game G TC Similar to eBay auctions: privacy = money. But, privacy cannot be «reimbursed» 6

7 7 AD Minimum required trust threshold Start Deadline Time …… A D

8 8 AD Start Deadline Time …… A D Winner

9 9 AD Start Deadline Time Attacker-Defender Game: captures at the macroscopic level the competition between attackers and defenders to support their respective versions of the truth

10 10 AD Start Deadline Time Trust Contribution Game: defines at the microscopic level the individual amounts of privacy to be contributed by entities in each side to collectively win G AD

11 Attacker-Defender Game 11 Access to channel is probabilistic Theorem: The strategy (W,W) is the Perfect Bayesian Equilibrium of G AD Players – Attackers – Defenders Strategies – Wait (W) – Send (S) Start Deadline

12 Trust Contribution Game 12 Theorem: The Subgame Perfect Equilibrium of G TC is defined by: Theorem: The Subgame Perfect Equilibrium of G TC is defined by: No entity contributes!

13 Game with Incentives 13 reward for playing early Start Deadline Theorem: The equilibrium of is defined by: K: # of users Theorem: The equilibrium of is defined by: K: # of users Corollary: The strategy (S,S) can be enforced in G AD by choosing appropriate reward r. I Incentives help

14 Conclusion Data-centric trust can reduce privacy losses compared to entity-centric trust Privacy-preserving entities are selfish by definition and need a game-theoretic analysis Without incentives, privacy-preserving entities do not contribute to trust establishment 14


Download ppt "On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks Maxim …...…. Raya Reza …….…. Shokri Jean-Pierre..Hubaux LCA1, EPFL, Switzerland The."

Similar presentations


Ads by Google