22-10-2012, 03:21 PM
Wireless Mesh Networks (WMNs):
Wireless Mesh Networks.docx (Size: 238.58 KB / Downloads: 21)
Wireless Mesh Networks (WMNs) represent a good solution to providing wireless Internet connectivity in a sizable geographic area; this new and promising paradigm allows for network deployment at a much lower cost than with classic WiFi networks. In WMNs, it is possible to cover the same area (or even a larger one) with only one WHS and several wireless Transit Access Points (TAPs). The TAPs are not connected to the wired infrastructure and therefore rely on the WHS to relay their traffic.
1. Network Model:
The network model proposed here is based on the assumption that the traffic is static or quasi-static. We believe that it is reasonable since the traffic seen by the mesh routers is aggregated.
Basic Protocol Suite:
Basic Protocol Suite used to achieve Privacy Against Passive attackers and other
network users. This Protocol Consists 3 Parts:
Anonymous Local Key Establishment Protocol:
Anonymous Local key Establishment Protocol is used to finding the sub sequent route Path.
Node-to-Router path Finding and Registration protocol:
Node-to-Router Path finding and Registration Protocol is used to establish the route between mesh client and mesh router, then registers the client to the mesh Router.
Anonymous Message Delivery Protocol:
This Protocol is used to send a message anonymously delivered from source to destination.
Advanced Protocol Suite:
Advanced Protocol Suite is used to achieve Privacy Against Passive attackers and other network users. Additionally each user have a public/private key pair, Any User Knows other user ‘s public key so that a secret key can be computed by a sender.
1) Anonymous User Registration
2) Onion-Routing-Based Router-Router Message Delivery
2. Threat Model:
A threat is an undesired event. A potential occurrence, often best described as an effect that might damage or compromise an asset or objective. Threat modeling is performed to identify when and where more effort should be applied. There are many possible vulnerabilities, threats, and exploits. Threat modeling is used to compromise the following
Features:
• Sender/Receiver Anonymity: Receiver anonymity can also be compromised by the actual contents of the public key used to encrypt messages. If several senders share the same public key to encrypt messages to be sent for an anonymous receiver, then they can infer that they are in-deed sending to the same receiver. They can then aggregate the information they each have on that receiver to further compromise his anonymity. To achieve receiver anonymity a receiver must be able to create several truly anonymous identities that will allow for a sender to both encrypt and route messages to him.