The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2012 vol.9)
pp: 443-446
Huaqun Wang , Dalian Ocean University, Dalian
Yuqing Zhang , National Computer Network Intrusion Protection Center, GUCAS, Beijing,
ABSTRACT
In 2011, Sun et al. [CHECK END OF SENTENCE] proposed a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in wireless mesh networks (WMNs). It strives to resolve the conflicts between the anonymity and traceability objectives. In this paper, we attacked Sun et al. scheme's traceability. Our analysis showed that trusted authority (TA) cannot trace the misbehavior client (CL) even if it double-time deposits the same ticket.
INDEX TERMS
WMNs, cryptanalysis, anonymity, traceability.
CITATION
Huaqun Wang, Yuqing Zhang, "On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks", IEEE Transactions on Dependable and Secure Computing, vol.9, no. 3, pp. 443-446, May/June 2012, doi:10.1109/TDSC.2011.53
REFERENCES
[1] M. Raya and J-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007.
[2] S. Brands, "Untraceable Off-Line Cash in Wallets with Observers," Proc. CRYPTO '93, pp. 302-318, 1993.
[3] K. Wei, Y.R. Chen, A.J. Smith, and B. Vo, "Whopay: A Scalable and Anonymous Payment System for Peer-to-Peer Environments," Proc. IEEE Intl'l Conf. Distributed Computing Systems, 2006.
[4] J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. IEEE Conf. Computer Comm., pp. 1687-1695, 2008.
[5] J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 2, pp. 295-307, 2011.
[6] X. Chen, F. Zhang, Y. Mu, and W. Susilo, "Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings," Proc. Financial Cryptography 2006, pp. 251-265, 2006.
[7] X. Chen, F. Zhang, and S. Liu, "ID-Based Restrictive Partially Blind Signatures and Applications," J. Systems and Software, vol. 80, no. 2, pp. 164-171, 2007.
[8] X. Hu and S. Huang, "Analysis of ID-Based Restrictive Partially Blind Signatures and Applications," J. Systems and Software, vol. 81, no. 11, pp. 1951-1954, 2008.
[9] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct. 2006.
[10] D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairings, Advances in Cryptology-Asiacrypt 2001, pp. 514-532, 2001.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool