08-05-2012, 11:21 AM
A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks
sat- a security architecture achieving anonymity and traceability in wireless mesh networks.pdf (Size: 657.75 KB / Downloads: 158)
INTRODUCTION
Wireless Mesh Network (WMN) is a promising technology
and is expected to be widespread due to its lowinvestment
feature and the wireless broadband services
it supports, attractive to both service providers and
users. However, security issues inherent in WMNs or
any wireless networks need be considered before the
deployment and proliferation of these networks, since it
is unappealing to subscribers to obtain services without
security and privacy guarantees. Wireless security has
been the hot topic in the literature for various network
technologies such as cellular networks [4], wireless local
area networks (WLAN) [5], wireless sensor networks [6],
[7], mobile ad hoc networks (MANETs) [8], [9], and
vehicular ad hoc networks (VANETs) [10].
Blind Signature
Blind signature is first introduced by Chaum [24]. In
general, a blind signature scheme allows a receiver to
obtain a signature on a message such that both the
message and the resulting signature remain unknown
to the signer. We refer the readers to [27] for a formal
definition of a blind signature scheme, which should
bear the properties of verifiability, unlinkability, and
unforgeability according to [24].
Network Architecture
Consider the network topology of a typical WMN depicted
in Fig. 1. The wireless mesh backbone consists of
mesh routers and gateways interconnected by ordinary
wireless links (shown as dotted curves). Mesh routers
and gateways serve as the access points of the WMN
and the last resorts to the Internet, respectively. The
hospital, campus, enterprise and residential buildings
are instances of individual WMN domains subscribing
to the Internet services from upstream service providers,
shown as the Internet cloud