On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

14
On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks Maxim…...….Raya Reza…….….Shokri Jean-Pierre..Hubaux LCA1, EPFL, Switzerland The Third ACM Conference on Wireless Network Security (WiSec‘10) March 2010 Hoboken, NJ, USA

description

On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks. Maxim …...…. Raya Reza …….…. Shokri Jean-Pierre .. Hubaux LCA1, EPFL, Switzerland The Third ACM Conference on Wireless Network Security (WiSec‘10) March 2010 Hoboken, NJ, USA . The Trust-Privacy Tradeoff. - PowerPoint PPT Presentation

Transcript of On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

Page 1: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

On the Tradeoff betweenTrust and Privacy

in Wireless Ad Hoc NetworksMaxim…...….RayaReza…….….ShokriJean-Pierre..Hubaux

LCA1, EPFL, Switzerland

The Third ACM Conference on Wireless Network Security (WiSec‘10) March 2010 Hoboken, NJ, USA

Page 2: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

The Trust-Privacy Tradeoff

Entity-centric trust• Trust is built in each entity

• The cost is reduced privacy

Data-centric trust• Trust is built in the data

• Entities can keep privacy

2

priva

cyse

curit

y

securityprivacy

Page 3: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

The Dilemma of Data-Centric Trust

• Data increasingly comes from multiple sources

• Mobile devices reflect their users’ preferences and hence characterize them

3

Ephemeral network

Users are not fully hidden behind their data!

More contributions = More accurate trust

Page 4: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

The Privacy-Preserving Gene

• Building data-centric trust is a collective effort• Users might lose some of their privacy• What if entities are privacy-preserving?• A privacy-preserving entity maximizes its privacy• Game theory: A selfish entity optimizes its utility• Privacy-preservation = Selfishness

4

How to build data-centric trust in ephemeral networks with privacy-preserving entities?

Page 5: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

Example: VANET• CA pre-establishes

credentials offline• Entities communicate

attributes (e.g., credentials, location)

• Communication is sequential

• There are deadlines on making decisions

• Benign entities disseminate truthful info

• Adversaries disseminate false info

5

Page 6: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

Trust-Privacy Games• Problem: privacy-preserving entities building data-centric

trust in the presence of privacy-preserving attackers• Game theory can help by modeling situations where the

decisions of players affect each other

• Attacker-Defender Game GAD

• Trust Contribution Game GTC

• Similar to eBay auctions: privacy = money.• But, privacy cannot be «reimbursed»

6

Page 7: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

7

A D

Minimum required trust threshold

Start

Deadline

Time ……

A D

Page 8: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

8

A D

Start

Deadline

Time ……

A D

Winner

Page 9: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

9

A D

Start

Deadline

Time

Attacker-Defender Game: captures at the macroscopic level the competition between attackers and defenders to support their respective versions of the truth

ADG

Page 10: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

10

A D

Start

Deadline

Time

TCG

ADG

Trust Contribution Game: defines at the microscopic level the individual amounts of privacy to be contributed by entities in each side to collectively win GAD

Page 11: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

Attacker-Defender Game

11

Access to channel is probabilistic

Theorem: The strategy (W,W) is the Perfect Bayesian Equilibrium of GAD

• Players– Attackers– Defenders

• Strategies– Wait (W)– Send (S)

Start

Deadline

Page 12: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

Trust Contribution Game

12

Theorem: The Subgame Perfect Equilibrium of GTC is defined by:

* 0kt

No entity contributes!

Page 13: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

Game with Incentives

13re

war

d fo

r pla

ying

ear

ly

Start

Deadline

Theorem: The equilibrium of is defined by:

K: # of users

ITCG

*2

( 1)k

r KtK

Corollary: The strategy (S,S) can be enforced in GAD by choosing appropriate reward r. I

Incentives help

Page 14: On the Tradeoff between Trust and Privacy in Wireless Ad Hoc Networks

Conclusion

• Data-centric trust can reduce privacy losses compared to entity-centric trust

• Privacy-preserving entities are selfish by definition and need a game-theoretic analysis

• Without incentives, privacy-preserving entities do not contribute to trust establishment

14