26-04-2012, 03:55 PM
need the documentation of sat..plz send it soon
26-04-2012, 03:55 PM
need the documentation of sat..plz send it soon
02-06-2012, 11:28 AM
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks A Security Architecture Achieving Anonymity.pdf (Size: 522.47 KB / Downloads: 42) Abstract Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. INTRODUCTION WIRELESS Mesh Network (WMN) is a promising technology and is expected to be widespread due to its lowinvestment feature and the wireless broadband services it supports, attractive to both service providers and users. However, security issues inherent in WMNs or any wireless networks need be considered before the deployment and proliferation of these networks, since it is unappealing to subscribers to obtain services without security and privacy guarantees. Wireless security has been the hot topic in the literature for various network technologies such as cellular networks [1], wireless local area networks (WLANs) [2], wireless sensor networks [3], [4], mobile ad hoc networks (MANETs) [5], [6], and vehicular ad hoc networks (VANETs) [7]. Recently, new proposals on WMN security [8], [9] have emerged. In [8], the authors describe the specifics of WMNs and identify three fundamental network operations that need to be secured. Blind Signature Blind signature is first introduced by Chaum [23]. In general, a blind signature scheme allows a receiver to obtain a signature on a message such that both the message and the resulting signature remain unknown to the signer. We refer the readers to [26] for a formal definition of a blind signature scheme, which should bear the properties of verifiability, unlinkability, and unforgeability according to [23]. Network Architecture Consider the network topology of a typical WMN depicted in Fig. 1. The wireless mesh backbone consists of mesh routers (MRs) and gateways (GWs) interconnected by ordinary wireless links (shown as dotted curves). Mesh routers and gateways serve as the access points of the WMN and the last resorts to the Internet, respectively. The hospital, campus, enterprise, and residential buildings are instances of individual WMN domains subscribing to the Internet services from upstream service providers, shown as the Internet cloud in Fig. 1. EachWMNdomain, or trust domain (to be used interchangeably) is managed by a domain administrator that serves as a trusted authority (TA), e.g., the central server of a campus WMN. SAT SECURITY ARCHITECTURE Ticket-Based Security Architecture First, we restrict our discussion to within the home domain. The interdomain protocols in our security architecture, which are executed when the client roams outside his home domain, will be presented in Section 4.1.5. The ticket-based security architecture consists of ticket issuance, ticket deposit, fraud detection, and ticket revocation protocols. In what follows, we will describe these protocols in detail, together with the fulfillment of authentication, data integrity, and confidential communications that may take place during the execution of these protocols. CONCLUSION In this paper, we propose SAT, a security architecture mainly consisting of the ticket-based protocols, which resolves the conflicting security requirements of unconditional anonymity for honest users and traceability of misbehaving users. By utilizing the tickets, self-generated pseudonyms, and the hierarchical identity-based cryptography, the proposed architecture is demonstrated to achieve desired security objectives and efficiency. |
|