Zhaowei Hu, Shiyun Ni, Hangyi Quan, Bocheng Ding, Peng He
{"title":"KAIM:基于双重激励的分布式k -匿名选择机制","authors":"Zhaowei Hu, Shiyun Ni, Hangyi Quan, Bocheng Ding, Peng He","doi":"10.1016/j.adhoc.2025.103839","DOIUrl":null,"url":null,"abstract":"<div><div>With the growing demand for privacy protection, the construction of anonymous zones based on distributed K-anonymity mechanisms has gained widespread attention in the field of location privacy protection. However, existing methods often overlook the limitations of reputation evaluation in identifying potential unknown malicious behaviors of collaborators when selecting assistants to build K-anonymous zones. At the same time, the issue of delayed responses from collaborators during the process of encouraging user cooperation through incentive mechanisms, which may lead to construction failures, has not been effectively addressed. To tackle these challenges, this paper proposes a dual-incentive distributed K-anonymity selection mechanism (KAIM) that combines the Hidden Markov Model (HMM). This mechanism encourages collaborators to participate in the construction of anonymous zones quickly and on time by establishing two incentive models: the requester collaboration incentive model and the collective benefit optimization incentive model. These dual incentives help form the optimal requester-collaborator participation set, enabling efficient construction of K-anonymous zones. Additionally, the KAIM mechanism uses the HMM to model the behaviors of requesters and collaborators, and its effectiveness in identifying malicious user behaviors is validated on real datasets. Experimental results show that the HMM model can identify anomalous activities that significantly differ from normal behavioral patterns with high accuracy, providing strong assurance for the construction of anonymous zones.</div></div>","PeriodicalId":55555,"journal":{"name":"Ad Hoc Networks","volume":"175 ","pages":"Article 103839"},"PeriodicalIF":4.4000,"publicationDate":"2025-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"KAIM: A distributed K-anonymity selection mechanism based on dual incentives\",\"authors\":\"Zhaowei Hu, Shiyun Ni, Hangyi Quan, Bocheng Ding, Peng He\",\"doi\":\"10.1016/j.adhoc.2025.103839\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>With the growing demand for privacy protection, the construction of anonymous zones based on distributed K-anonymity mechanisms has gained widespread attention in the field of location privacy protection. However, existing methods often overlook the limitations of reputation evaluation in identifying potential unknown malicious behaviors of collaborators when selecting assistants to build K-anonymous zones. At the same time, the issue of delayed responses from collaborators during the process of encouraging user cooperation through incentive mechanisms, which may lead to construction failures, has not been effectively addressed. To tackle these challenges, this paper proposes a dual-incentive distributed K-anonymity selection mechanism (KAIM) that combines the Hidden Markov Model (HMM). This mechanism encourages collaborators to participate in the construction of anonymous zones quickly and on time by establishing two incentive models: the requester collaboration incentive model and the collective benefit optimization incentive model. These dual incentives help form the optimal requester-collaborator participation set, enabling efficient construction of K-anonymous zones. Additionally, the KAIM mechanism uses the HMM to model the behaviors of requesters and collaborators, and its effectiveness in identifying malicious user behaviors is validated on real datasets. Experimental results show that the HMM model can identify anomalous activities that significantly differ from normal behavioral patterns with high accuracy, providing strong assurance for the construction of anonymous zones.</div></div>\",\"PeriodicalId\":55555,\"journal\":{\"name\":\"Ad Hoc Networks\",\"volume\":\"175 \",\"pages\":\"Article 103839\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Ad Hoc Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1570870525000873\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Ad Hoc Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1570870525000873","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
KAIM: A distributed K-anonymity selection mechanism based on dual incentives
With the growing demand for privacy protection, the construction of anonymous zones based on distributed K-anonymity mechanisms has gained widespread attention in the field of location privacy protection. However, existing methods often overlook the limitations of reputation evaluation in identifying potential unknown malicious behaviors of collaborators when selecting assistants to build K-anonymous zones. At the same time, the issue of delayed responses from collaborators during the process of encouraging user cooperation through incentive mechanisms, which may lead to construction failures, has not been effectively addressed. To tackle these challenges, this paper proposes a dual-incentive distributed K-anonymity selection mechanism (KAIM) that combines the Hidden Markov Model (HMM). This mechanism encourages collaborators to participate in the construction of anonymous zones quickly and on time by establishing two incentive models: the requester collaboration incentive model and the collective benefit optimization incentive model. These dual incentives help form the optimal requester-collaborator participation set, enabling efficient construction of K-anonymous zones. Additionally, the KAIM mechanism uses the HMM to model the behaviors of requesters and collaborators, and its effectiveness in identifying malicious user behaviors is validated on real datasets. Experimental results show that the HMM model can identify anomalous activities that significantly differ from normal behavioral patterns with high accuracy, providing strong assurance for the construction of anonymous zones.
期刊介绍:
The Ad Hoc Networks is an international and archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in ad hoc and sensor networking areas. The Ad Hoc Networks considers original, high quality and unpublished contributions addressing all aspects of ad hoc and sensor networks. Specific areas of interest include, but are not limited to:
Mobile and Wireless Ad Hoc Networks
Sensor Networks
Wireless Local and Personal Area Networks
Home Networks
Ad Hoc Networks of Autonomous Intelligent Systems
Novel Architectures for Ad Hoc and Sensor Networks
Self-organizing Network Architectures and Protocols
Transport Layer Protocols
Routing protocols (unicast, multicast, geocast, etc.)
Media Access Control Techniques
Error Control Schemes
Power-Aware, Low-Power and Energy-Efficient Designs
Synchronization and Scheduling Issues
Mobility Management
Mobility-Tolerant Communication Protocols
Location Tracking and Location-based Services
Resource and Information Management
Security and Fault-Tolerance Issues
Hardware and Software Platforms, Systems, and Testbeds
Experimental and Prototype Results
Quality-of-Service Issues
Cross-Layer Interactions
Scalability Issues
Performance Analysis and Simulation of Protocols.