Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks

02/11/2022
by   M. Shariatnasab, et al.
0

This work considers the fundamental privacy limits under active fingerprinting attacks in power-law bipartite networks. The scenario arises naturally in social network analysis, tracking user mobility in wireless networks, and forensics applications, among others. A stochastic growing network generation model – called the popularity-based model – is investigated, where the bipartite network is generated iteratively, and in each iteration vertices attract new edges based on their assigned popularity values. It is shown that using the appropriate choice of initial popularity values, the node degree distribution follows a power-law distribution with arbitrary parameter α>2, i.e. fraction of nodes with degree d is proportional to d^-α. An active fingerprinting deanonymization attack strategy called the augmented information threshold attack strategy (A-ITS) is proposed which uses the attacker's knowledge of the node degree distribution along with the concept of information values for deanonymization. Sufficient conditions for the success of the A-ITS, based on network parameters, are derived. It is shown through simulations that the proposed attack significantly outperforms the state-of-the-art attack strategies.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/09/2021

Fundamental Privacy Limits in Bipartite Networks under Active Attacks

This work considers active deanonymization of bipartite networks. The sc...
research
09/24/2019

Analysis of a Model for Generating Weakly Scale-free Networks

It is commonly believed that real networks are scale-free and fraction o...
research
08/08/2023

Spartan Bipartite Graphs are Essentially Elementary

We study a two-player game on a graph between an attacker and a defender...
research
03/03/2020

Will Scale-free Popularity Develop Scale-free Geo-social Networks?

Empirical results show that spatial factors such as distance, population...
research
08/30/2021

Single Node Injection Attack against Graph Neural Networks

Node injection attack on Graph Neural Networks (GNNs) is an emerging and...
research
05/19/2017

Approximation of LRU Caches Miss Rate: Application to Power-law Popularities

Building on the 1977 pioneering work of R. Fagin, we give a closed-form ...
research
06/25/2022

Cascading Failures in Smart Grids under Random, Targeted and Adaptive Attacks

We study cascading failures in smart grids, where an attacker selectivel...

Please sign up or login with your details

Forgot password? Click here to reset