Open Access Open Access  Restricted Access Subscription or Fee Access

TAB -Ticketing and Blinding for Realizing Anonymity and Traceability in Wireless Mesh Networks

P. Saranya Devi, S. Shanmuga Preetha, S. Athilakshmi

Abstract


In this architecture, the conflicts between anonymity and traceability is resolved. Anonymity has received increased attention due to the users awareness of their privacy nowadays. Anonymity can be implemented to make it impossible or very difficult to find out the real author of a message. A common variant of anonymity is pseudonymity.But due to anonymity service, the misbehaving user remains untraced. So, a security architecture is proposed to ensure unconditionally anonymity for honest user and conditional anonymity for misbehaving user in wireless mesh networks. To achieve this ticketing and blinding technique is used. In addition to anonymity and traceability, other requirements such as efficiency, feasibility and effectiveness is also resolved.


Keywords


Anonymity, Traceability, Ticket Reuse, Multiple Deposit, Wireless Mesh Network (WMN).

Full Text:

PDF

References


S. Brands, “Untraceable off-line cash in wallets with observers,”in Proc. CRYPTO’93, 13th Annual Int’l Cryptology Conf. on Advances in Cryptology, pp. 302–318, Aug. 1993.

L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE NetworkMagazine, vol.13, no.6, pp. 24–30, Dec. 1999.

M. Raya and J-P. Hubaux, “Securing vehicular ad hoc networks,”Journal of Computer Security, Special Issue on Security of Ad Hoc andSensor Networks, vol. 15, no.1, pp. 39–68, 2007.

N. B. Salem and J-P. Hubaux, “Securing wireless mesh networks,”IEEE Wireless Communications,vol. 13, no. 2, Apr. 2006.

Y. Zhang and Y. Fang, “ARSA: An attack-resilient security architecture for multihop wireless mesh networks,” IEEE J. Select.Areas Communications, vol. 24, no. 10, pp. 1916–1928, Oct. 2006.

D. Chaum, A. Fiat, and M. Naor, Untraceable electronic cash, in Proc. on Advances in Cryptology (CRYPTO’88), 2002.

J. Sun, C. Zhang, and Y. Fang, “A security architecture achieving anonymity and traceability in wireless mesh networks,” IEEE Conf. on Computer Communications (INFOCOM), pp. 1687–1695,Apr. 2008.

G. Maitland and C. Boyd, A provably secure restrictive partially blind signature scheme, LNCS 2274, pp. 99-114, Springer-Verlag, 2002.

X. Chen, F. Zhang, Y.Mu, and W.Susilo, “Efficient provably secure restrictive partially blind signatures from bilinear pairings,”in Proc. 10th Conf. on Financial Cryptography and Data Security, FC2006, pp. 251–265, Feb. 2006.

X. Chen, F. Zhang, and S. Liu, “ID-based restrictive partially blind signatures and applications,” Journal of Systems and Software, vol.80, no. 2, pp. 164–171, Feb. 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.