{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:10:44Z","timestamp":1760242244202,"version":"build-2065373602"},"reference-count":16,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T00:00:00Z","timestamp":1486684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user\u2019s contexts, based on which it provides personalized services. However, the application may sell the user\u2019s contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one.<\/jats:p>","DOI":"10.3390\/s17020339","type":"journal-article","created":{"date-parts":[[2017,2,10]],"date-time":"2017-02-10T05:27:09Z","timestamp":1486704429000},"page":"339","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Context Sensing System Analysis for Privacy Preservation Based on Game Theory"],"prefix":"10.3390","volume":"17","author":[{"given":"Shengling","family":"Wang","sequence":"first","affiliation":[{"name":"College of Information Science and Technology, Beijing Normal University, Beijing 100875, China"}]},{"given":"Luyun","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Beijing Normal University, Beijing 100875, China"}]},{"given":"Weiman","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of Physics, Beijing Normal University, Beijing 100875, China"}]},{"given":"Junqi","family":"Guo","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Beijing Normal University, Beijing 100875, China"}]},{"given":"Rongfang","family":"Bie","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Beijing Normal University, Beijing 100875, China"}]},{"given":"Kai","family":"Lin","sequence":"additional","affiliation":[{"name":"Telecommunications Engineering with Management, International School, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"1968","published-online":{"date-parts":[[2017,2,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"G\u00f6tz, M., Nath, S., and Gehrke, J. (2012, January 20\u201324). Maskit: Privately releasing user context streams for personalized mobile applications. Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, Scottsdale, AZ, USA.","DOI":"10.1145\/2213836.2213870"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Wang, W., and Zhang, Q. (May, January 27). A stochastic game for privacy preserving context sensing on mobile phone. Proceedings of the IEEE INFOCOM 2014\u2014IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6848177"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Duan, Z., Yan, M., Cai, Z., Wang, X., Han, M., and Li, Y. (2016). Truthful Incentive Mechanisms for Social Cost Minimization in Mobile Crowdsourcing Systems. Sensors, 16.","DOI":"10.3390\/s16040481"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1109\/LCOMM.2011.092911.111598","article-title":"An efficient privacy preserving data aggregation scheme with constant communication overheads for wireless sensor networks","volume":"15","author":"Yang","year":"2011","journal-title":"IEEE Commun. Lett."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.comnet.2016.03.016","article-title":"An incentive mechanism with privacy protection in mobile crowdsourcing systems","volume":"102","author":"Wang","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TNSM.2016.2559448","article-title":"FakeMask: A Novel Privacy Preserving Approach for Smartphones","volume":"13","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Groat, M.M., He, W., and Forrest, S. (2011, January 10\u201315). KIPDA: K-indistinguishable privacy-preserving data aggregation in wireless sensor networks. Proceedings of the 2011 Proceedings IEEE INFOCOM, Shanghai, China.","DOI":"10.1109\/INFCOM.2011.5935010"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.pmcj.2010.04.001","article-title":"AnonySense: A system for anonymous opportunistic sensing","volume":"7","author":"Shin","year":"2011","journal-title":"Pervasive Mob. Comput."},{"key":"ref_9","unstructured":"Vu, K., Zheng, R., and Gao, L. (2012, January 25\u201330). Efficient algorithms for k-anonymous location privacy in participatory sensing. Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/TMC.2006.144","article-title":"Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation","volume":"5","author":"Westhoff","year":"2006","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_11","unstructured":"Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., and Boneh, D. (2011, January 6\u20139). Location Privacy via Private Proximity Testing. Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"976","DOI":"10.1287\/opre.1070.0434","article-title":"Balancing Terrorism and Natural Disasters\u2014Defensive Strategy with Endogenous Attacker Effort","volume":"55","author":"Zhuang","year":"2007","journal-title":"Oper. Res."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1040","DOI":"10.1111\/risa.12227","article-title":"Modeling insurer-homeowner interactions in managing natural disaster risk","volume":"34","author":"Kesete","year":"2014","journal-title":"Risk Anal."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.1007\/s11069-014-1231-3","article-title":"Modeling the integrated roles of insurance and retrofit in managing natural disaster risk: A multi-stakeholder perspective","volume":"74","author":"Peng","year":"2014","journal-title":"Nat. Hazards"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1057\/jors.2013.53","article-title":"Subsidizing to disrupt a terrorism supply chain: A four-player game","volume":"65","author":"Shan","year":"2014","journal-title":"J. Oper. Res. Soc."},{"key":"ref_16","unstructured":"Shiyu, X. (2002). Economic Game Theory, Fudan University Publishing House."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/2\/339\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:27:54Z","timestamp":1760207274000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/2\/339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,10]]},"references-count":16,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,2]]}},"alternative-id":["s17020339"],"URL":"https:\/\/doi.org\/10.3390\/s17020339","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,2,10]]}}}