27-09-2012, 03:45 PM
Security Architecture Achieving Anonymity and Traceability
Security Architecture.pptx (Size: 459 KB / Downloads: 32)
PROBLEM DEFINATION:
Anonymity provides protection for users to enjoy network services without being traced.
While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs).
On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable.
Here, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs.
The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality, data integrity, and no repudiation.
Existing System:
In wireless communication systems, it is easier for a global observer to mount traffic analysis attacks by following the packet forwarding path than in wired networks. Thus, routing anonymity is indispensable, which conceals the confidential communication relationship of two parties by building an anonymous path between them.
The unconditional anonymity may incur insider attacks since misbehaving users are no longer traceable. Therefore, traceability is highly desirable such as in e-cash systems where it is used for detecting and tracing double-spenders.
DRAWBACKS OF EXSTING SYSTEMS:
In the existing Systems, there exists Conflicts between the anonymity and traceability.
The fundamental security requirements including authentication, confidentiality, data integrity, and non-repudiation are not achieved in the existing systems.
PROPOSED SYSTEM:
We have proposed the initial design of our security architecture, where the feasibility and applicability of the architecture were not fully understood. As a result, we provide detailed efficiency analysis in terms of storage, communication, and computation.
We are motivated by resolving the above security conflicts, namely anonymity and traceability, in the emerging WMN communication systems.
ADVANTAGES:
Our System protects the identity of providers of files.
protect the identity of consumers of files
protect the contents of files from people outside the network
The security requirements including authentication, data integrity, and confidentiality are achieved in proposed systems.
Objective:
Our System’s main Objective is to provide Anonymity and Traceability.
Anonymity is to unlink a user’s identity to his or her specific activities, such as the anonymity fulfilled in the untraceable e-cash systems and the P2P payment systems, where the payments cannot be linked to the identity of a payer by the bank or broker.
Traceability is used for detecting and tracing double-spenders
MOTIVATION:
We are motivated by resolving the security conflicts of anonymity and traceability in the emerging WMNs communication systems.
Our system borrows the blind signature technique from payment systems, and hence, can achieve the anonymity of unlinking user identities from activities, as well as the traceability of misbehaving users. Furthermore, the proposed pseudonym technique renders user location information unexposed.
TICKET ISSUANCE
In order to maintain security of the network against attacks and the fairness among clients,
the home server manager may
control the access of each client
by issuing tickets based on the
misbehavior history of the client,