On the tradeoff between trust and privacy in wireless ad hoc networks

As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly contradicting requirements? In this paper, we show that the notion of data-centric trust can considerably alleviate the tension, although at the cost of pooling contributions from several entities. Hence, assuming an environment of privacy-preserving entities, we provide and analyze a game-theoretic model of the trust-privacy tradeoff. The results prove that the use of incentives allows for building trust while keeping the privacy loss minimal. To illustrate our analysis, we describe how the trust-privacy tradeoff can be optimized for the revocation of misbehaving nodes in an ad hoc network.

[1]  Maxime Raya,et al.  Data-centric trust in ephemeral networks , 2009 .

[2]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Marianne Winslett,et al.  Protecting Privacy during On-Line Trust Negotiation , 2002, Privacy Enhancing Technologies.

[4]  Christian Damsgaard Jensen,et al.  Trading Privacy for Trust , 2004, iTrust.

[5]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[6]  Bharat Bhargava,et al.  Privacy and Trust in Online Interactions , 2008 .

[7]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.

[8]  Jonathan Katz,et al.  Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.

[9]  Roger Dingledine,et al.  On the Economics of Anonymity , 2003, Financial Cryptography.

[10]  Mikhail J. Atallah,et al.  Private Information: To Reveal or not to Reveal , 2008, TSEC.

[11]  Joseph Y. Halpern,et al.  Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.

[12]  Boi Faltings,et al.  Collusion-resistant, incentive-compatible feedback payments , 2007, EC '07.

[13]  Robin Kravets,et al.  MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .

[14]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[15]  Bharat Bhargava,et al.  Trading Privacy for Trust in Online Interactions , 2007 .