20-03-2012, 10:53 PM
plz send me a security architecture achieving anonymity and traceability in wireless mesh networks ppts plsss..
20-03-2012, 10:53 PM
plz send me a security architecture achieving anonymity and traceability in wireless mesh networks ppts plsss..
04-05-2012, 07:17 PM
plz send me ppts of a security architecture achieving anonymity and traceability in wireless mesh networks
16-11-2012, 06:27 PM
A Security Architecture Achieving Anonimity And Traceability In Wireless Mesh Networks
A Security Architecture Achieving.pptx (Size: 583.04 KB / Downloads: 57) Abstract: Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems. Introduction Wireless Mesh Network (WMN) is a promising technology and is expected to be widespread due to its low investment feature and the wireless broadband services it supports, attractive to both service providers and users. Existing System In wireless communication systems, it is easier for a global observer to mount traffic analysis attacks by following the packet forwarding path than in wired networks. Thus, routing anonymity is indispensable, which conceals the confidential communication relationship of two parties by building an anonymous path between them. Proposed System We are motivated by resolving the above security conflicts, namely anonymity and traceability, in the emerging WMN communication systems. We have proposed the initial design of our security architecture , where the feasibility and applicability of the architecture were not fully understood. As a result, we provide detailed efficiency analysis in terms of storage, communication, and computation. Ticket Issuance: In order to maintain security of the network against attacks and the fairness among clients , the home server manager may control the access of each client by issuing tickets based on the misbehavior history of the client. Fundamental Security Objectives: It is trivial to show that our security architecture satisfies the security requirements for authentication, data integrity, and confidentiality ,which follows directly from the employment of the standard cryptographic primitives. anonymity (noun) a state of being unknown; namelessness; lacking individuality. If a person likes to remain unknown, they like anonymity. Anonymity is a situation in which a person's name, either on their request, or for any other reason, is kept a secret. A large number of people living in a group in which none of them are extraordinary in any way, live in anonymity. No one among them has individuality.The famous writer of satires Jonathan Swift, of Gulliver's Travels fame, had his earlier books published in anonymity. Only later did people come to know that he was the author of those highly imaginative works. Today, even in affluent countries, a large number of people live in anonymity, at subsistence levels, in slums. Conclusion: we propose SAT, a security architecture mainly consisting of the ticket-based protocols, which resolves the conflicting security requirements of unconditional anonymity for honest users and traceability of misbehaving users. By utilizing the tickets, self-generated pseudonyms, and the hierarchical identity-based cryptography, the proposed architecture is demonstrated to achieve desired security objectives and efficiency. |
|