This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks
May/June 2012 (vol. 9 no. 3)
pp. 443-446
Huaqun Wang, Dalian Ocean University, Dalian
Yuqing Zhang, National Computer Network Intrusion Protection Center, GUCAS, Beijing,
In 2011, Sun et al. [CHECK END OF SENTENCE] proposed a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in wireless mesh networks (WMNs). It strives to resolve the conflicts between the anonymity and traceability objectives. In this paper, we attacked Sun et al. scheme's traceability. Our analysis showed that trusted authority (TA) cannot trace the misbehavior client (CL) even if it double-time deposits the same ticket.

[1] M. Raya and J-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007.
[2] S. Brands, "Untraceable Off-Line Cash in Wallets with Observers," Proc. CRYPTO '93, pp. 302-318, 1993.
[3] K. Wei, Y.R. Chen, A.J. Smith, and B. Vo, "Whopay: A Scalable and Anonymous Payment System for Peer-to-Peer Environments," Proc. IEEE Intl'l Conf. Distributed Computing Systems, 2006.
[4] J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. IEEE Conf. Computer Comm., pp. 1687-1695, 2008.
[5] J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 2, pp. 295-307, 2011.
[6] X. Chen, F. Zhang, Y. Mu, and W. Susilo, "Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings," Proc. Financial Cryptography 2006, pp. 251-265, 2006.
[7] X. Chen, F. Zhang, and S. Liu, "ID-Based Restrictive Partially Blind Signatures and Applications," J. Systems and Software, vol. 80, no. 2, pp. 164-171, 2007.
[8] X. Hu and S. Huang, "Analysis of ID-Based Restrictive Partially Blind Signatures and Applications," J. Systems and Software, vol. 81, no. 11, pp. 1951-1954, 2008.
[9] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct. 2006.
[10] D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairings, Advances in Cryptology-Asiacrypt 2001, pp. 514-532, 2001.

Index Terms:
WMNs, cryptanalysis, anonymity, traceability.
Citation:
Huaqun Wang, Yuqing Zhang, "On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks," IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 3, pp. 443-446, May-June 2012, doi:10.1109/TDSC.2011.53
Usage of this product signifies your acceptance of the Terms of Use.