0% found this document useful (0 votes)
38 views11 pages

SAT 1st Review

The document proposes a security architecture for wireless mesh networks that provides unconditional anonymity for honest users while enabling traceability of misbehaving users. The architecture uses blind signatures to anonymize transactions while restricting them in a way that allows traceability if needed. It aims to resolve the conflict between anonymity and traceability objectives, while also ensuring authentication, confidentiality, data integrity, and non-repudiation. The proposed approach involves ticket issuance to control network access and fraud detection to identify misbehaving users in order to balance anonymity with accountability.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views11 pages

SAT 1st Review

The document proposes a security architecture for wireless mesh networks that provides unconditional anonymity for honest users while enabling traceability of misbehaving users. The architecture uses blind signatures to anonymize transactions while restricting them in a way that allows traceability if needed. It aims to resolve the conflict between anonymity and traceability objectives, while also ensuring authentication, confidentiality, data integrity, and non-repudiation. The proposed approach involves ticket issuance to control network access and fraud detection to identify misbehaving users in order to balance anonymity with accountability.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

PROVIDING SECURITY IN WIRELESS MESH NETWORKS USING ANONYMITY AND TRACEABILITY

Under the Guidance Of R. Rathi Assistant Professor, SITE

By Prabhuraj.J 07MSE152

AIM: Anonymity has received increasing attention in the literature due to the users awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. Here, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality, data integrity, and norepudiation. Thorough analysis on security and efficiency is incorporated, demonstrating the feasibility and effectiveness of the proposed architecture. SCOPE: Wireless Mesh Network (WMN) is a promising technology and is expected to be widespread due to its low investment feature and the wireless broadband services it supports, attractive to both service providers and users. However, security issues inherent in WMNs or any wireless networks need be considered before the deployment and proliferation of these networks, since it is unappealing to subscribers to obtain services without security and privacy guarantees. Wireless security has been the hot topic in the literature for various network technologies such as cellular networks, wireless local area networks (WLANs), wireless sensor networks, mobile ad hoc networks (MANETs), and vehicular ad hoc networks (VANETs). Anonymity and privacy issues have gained considerable research efforts in the literature, which have focused on investigating anonymity in different context or application scenarios. One requirement for anonymity is to unlink a users identity to his or her specific activities, such as the anonymity fulfilled in the untraceable e-cash systems and the P2P payment systems, where the payments cannot be linked to the identity of a payer by the bank or broker. Anonymity is also required to hide the location information of a user to prevent movement tracing, as is important in mobile networks and VANETs. In wireless communication systems, it is easier for a global observer to mount traffic analysis attacks by following the packet forwarding path than in wired networks. Thus, routing anonymity is indispensable, which conceals the confidential communication relationship of two parties by

building an anonymous path between them. Nevertheless, unconditional anonymity may incur insider attacks since misbehaving users are no longer traceable. Therefore, traceability is highly desirable such as in e-cash systems, where it is used for detecting and tracing double-spenders. OBJECTIVE:

1. Input Design is the process of converting a user-oriented description of the input into a computer-based system. This design is important to avoid errors in the data input process and show the correct direction to the management for getting correct information from the computerized system. 2. It is achieved by creating user-friendly screens for the data entry to handle large volume of data. The goal of designing input is to make data entry easier and to be free from errors. The data entry screen is designed in such a way that all the data manipulates can be performed. It also provides record viewing facilities. 3. When the data is entered it will check for its validity. Data can be entered with the help of screens. Appropriate messages are provided as when needed so that the user will not be in maize of instant. Thus the objective of input design is to create an input layout that is easy to follow.

LITERATURE SURVEY:

ARCHITECTURAL DESIGN:

REQUIREMENT ANALYSIS: HARDWARE REQUIREMENTS: System Hard Disk Floppy Drive Monitor Mouse Ram : Pentium IV 2.4 GHz. : 40 GB. : 1.44 Mb. : 15 VGA Colour. : Logitech. : 256 Mb.

SOFTWARE REQUIREMENTS: Data Flow Diagram: Operating system Front End Tool : Windows XP Professional : JAVA, Swing(JFC),J2ME : j2me wireless toolkit 2.5.2

Admin

Admin

Login

viewblindmessage

view misuses

User

startserver

client1

client2

client3

client4

Make transaction

send and receive messages

UML DIAGRAMS

a) Use Case Diagram: Admin

Admin

Login

view blindmessage

viewmisuses

User

Startserver

client1

client2

client3

client4

make transaction

send and receive messages

b) Sequence Diagram

Admin
LOGIN
Admin Enter username and password Enter data to insert and delete

view blindmesages

view misuses

User
startserver client1 client2 client3 client4

start start start

start

c) Activity Diagram

Admin

Adminlogin

view blind message

view misuses

User

Sta rt server

client2

Clie nt1

clie nt3

clie nt4

Make tran sa ction

d) Component Diagram:

Admin
enter username and password Login

Admin

View blind message

view misuses

User

start server

client1

client2

client3

client4

Make transaction

send and receive messages

MODULE DESCRIPTION Wireless mesh networks (WMNs)

The wireless mesh backbone consists of mesh routers (MRs) and gateways (GWs) interconnected by ordinary wireless links (shown as dotted curves). Mesh routers and gateways serve as the access points of the WMN and the last resorts to the Internet, respectively. Each WMN domain, or trust domain(to be used interchangeably) is managed by a domain administrator that serves as a trusted authority the central server of a campus WMN. Blind Signature In general, a blind signature scheme allows a receiver to obtain a signature on a message such that both the message and the resulting signature remain unknown to the signer. We refer the readers for a formal definition of a blind signature scheme, which should bear the properties of verifiability, unlinkability, and unforgeability. Blind signature scheme, where the restrictiveness property is incorporated into the blind signature scheme such that the message being signed must contain encoded information. As the name suggests, this property restricts the user in the blind signature scheme to embed some account-related secret information into what is being signed by the bank (otherwise, the signing will be unsuccessful) such that this secret can be recovered by the bank to identify a user if and only if he double-spends. The restrictiveness property is essentially the guarantee for traceability in the restrictive blind signature systems. Ticket Issuance In order to maintain security of the network against attacks and the fairness among clients, the home server manager may control the access of each client by issuing tickets based on the misbehavior history of the client, which reflects the server managers confidence about the client to act properly. Ticket issuance occurs when the client initially attempts to access the network or when all previously issued tickets are depleted. The client needs to reveal his real ID to the server manager in order to obtain a ticket since the server manager has to ensure the authenticity of this client.

Fraud Detection

Fraud is used interchangeably with misbehavior in this paper, which is essentially an insider attack. Ticket reuse generally results from the clients inability to obtain tickets from the TA when network access is desired, primarily due to the clients past misbehavior, which causes the server manager to constrain his ticket requests. Fundamental security objectives It is trivial to show that our security architecture satisfies the security requirements for authentication, data integrity, and confidentiality, which follows directly from the employment of the standard cryptographic primitives, message authentication code, and encryption, in our system. We are only left with the proof of nonrepudiation in this category. A fraud can be repudiated only if the client can provide a different representation, he knows of message from what is derived by the server manager. If the client has misbehaved, the representation he knows will be the same as the one derived by the server Manager which ensures nonrepudiation.

You might also like