The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2011 vol.8)
pp: 295-307
Jinyuan Sun , University of Florida, Gainesville
Chi Zhang , University of Florida, Gainesville
Yanchao Zhang , New Jersey Institute of Technology, Newark
Yuguang Fang , University of Florida, Gainesville
Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality, data integrity, and nonrepudiation. Thorough analysis on security and efficiency is incorporated, demonstrating the feasibility and effectiveness of the proposed architecture.
Anonymity, traceability, pseudonym, misbehavior, revocation, wireless mesh network (WMN).
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang, "SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks", IEEE Transactions on Dependable and Secure Computing, vol.8, no. 2, pp. 295-307, March/April 2011, doi:10.1109/TDSC.2009.50
[1] European Telecomm. Standards Inst. (ETSI), "GSM 2.09: Security Aspects," June 1993.
[2] P. Kyasanur and N.H. Vaidya, "Selfish MAC Layer Misbehavior in Wireless Networks," IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 502-516, Sept. 2005.
[3] A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Comm. ACM, vol. 47, no. 6, pp. 53-57, 2004.
[4] S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, Nov. 2006.
[5] W. Lou and Y. Fang, A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions, X. Chen, X. Huang, and D.-Z. Du, eds., Kluwer Academic Publishers/Springer, 2004.
[6] L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Dec. 1999.
[7] M. Raya and J-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007.
[8] N.B. Salem and J-P. Hubaux, "Securing Wireless Mesh Networks," IEEE Wireless Comm., vol. 13, no. 2, pp. 50-55, Apr. 2006.
[9] Y. Zhang and Y. Fang, "ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks," IEEE J. Selected Areas Comm., vol. 24, no. 10, pp. 1916-1928, Oct. 2006.
[10] I.F. Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Survey," Computer Networks, vol. 47, no. 4, pp. 445-487, Mar. 2005.
[11] S. Brands, "Untraceable Off-Line Cash in Wallets with Observers," Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cyptology (CRYPTO '93), pp. 302-318, Aug. 1993.
[12] K. Wei, Y.R. Chen, A.J. Smith, and B. Vo, "Whopay: A Scalable and Anonymous Payment System for Peer-to-Peer Environments," Proc. IEEE Int'l Conf. Distributed Computing Systems (ICDCS), July 2006.
[13] D. Chaum, A. Fiat, and M. Naor, "Untraceable Electronic Cash," Proc. Conf. Advances in Cryptology (CRYPTO '88), 2002.
[14] D. Figueiredo, J. Shapiro, and D. Towsley, "Incentives to Promote Availability in Peer-to-Peer Anonymity Systems," Proc. IEEE Int'l Conf. Network Protocols (ICNP), pp. 110-121, Nov. 2005.
[15] G. Ateniese, A. Herzberg, H. Krawczyk, and G. Tsudik, "Untraceable Mobility or How to Travel Incognito," Computer Networks, vol. 31, no. 8, pp. 871-884, Apr. 1999.
[16] Q. He, D. Wu, and P. Khosla, "Quest for Personal Control over Mobile Location Privacy," IEEE Comm. Magazine, vol. 42, no. 5, pp. 130-136, May 2004.
[17] A.R. Beresford and F. Stajano, "Location Privacy in Pervasive Computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, Jan.-Mar. 2003.
[18] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Comm., vol. 5, no. 9, pp. 2376-2385, Sept. 2006.
[19] S. Seys and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks," Proc. 20th Int'l Conf. Advanced Information Networking and Applications (AINA), pp. 133-137, Apr. 2006.
[20] M.G. Reed, P.F. Syverson, and D.M. Goldschlag, "Anonymous Connections and Onion Routing," IEEE J. Selected Areas Comm., vol. 16, no. 4, pp. 482-494, May 1998.
[21] R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router," Proc. USENIX Security Symp., pp. 303-320, Aug. 2004.
[22] J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. IEEE INFOCOM, pp. 1687-1695, Apr. 2008.
[23] D. Chaum, "Blind Signatures for Untraceable Payments," Advances in Cryptology—Crypto '82, pp. 199-203, Springer-Verlag, 1982.
[24] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct. 2006.
[25] D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairings," Advances in Cryptology-Asiacrypt 2001, pp. 514-532, Springer-Verlag, 2001.
[26] A. Juels, M. Luby, and R. Ostrovsky, "Security of Blind Digital Signatures," Advances in Cryptology—Crypto '97, pp. 150-164, Springer-Verlag, 1997.
[27] S. Brands, "An Efficient Offline Electronic Cash System Based on the Representation Problem," CWI Technical Report CS-R9323, 1993.
[28] M. Abe and T. Okamoto, "Provably Secure Partially Blind Signatures," Advances in Cryptology—Crypto 2000, pp. 271-286, Springer-Verlag, 2000.
[29] S.M. Chow, C.K. Hui, S.M. Yiu, and K.P. Chow, "Two Improved Partially Blind Signature Schemes from Bilinear Pairings," Proc. Australasian Conf. Information Security and Privacy (ACISP '05), pp. 316-328, 2005.
[30] G. Maitland and C. Boyd, "A Provably Secure Restrictive Partially Blind Signature Scheme," Lecture Notes in Computer Science, pp. 99-114, Springer-Verlag, 2002.
[31] X. Chen, F. Zhang, Y. Mu, and W. Susilo, "Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings," Proc. 10th Conf. Financial Cryptography and Data Security (FC '06), pp. 251-265, Feb. 2006.
[32] X. Chen, F. Zhang, and S. Liu, "ID-Based Restrictive Partially Blind Signatures and Applications," J. Systems and Software, vol. 80, no. 2, pp. 164-171, Feb. 2007.
[33] C. Gentry and A. Silverberg, "Hierarchical Id-Based Cryptography," Proc. ASIACRYPT, pp. 548-556, Dec. 2002.
[34] F. Hess, "Efficient Identity-Based Signature Schemes Based on Pairings," Selected Areas in Cryptography (SAC 2002), pp. 310-324, Springer-Verlag, 2002.
[35] R. Dutta, R. Barua, and P. Sarkar, Pairing-Based Cryptography: A Survey, Cryptology ePrint Archive, Report 2004/064,, 2004.
[36] R. Sakai, K. Ohgishi, and M. Kasahara, "Cryptosystems Based on Pairing," Proc. Symp. Cryptography and Information Security (SCIS), Jan. 2000.
[37] A. Menezes, P.V. Oorschot, and S. Vanston, Handbook of Applied Cryptography. CRC Press, 1996.
[38] S.M.M. Rahman, A. Inomata, T. Okamoto, M. Mambo, and E. Okamoto, "Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks," Proc. First Int'l Conf. Ubiquitous Convergence Technology, pp. 131-140, Dec. 2006.
[39] S.D. Galbraith, "Pairings," Advances in Elliptic Curve Cryptography, I.F. Blake, G. Seroussi, and N.P. Smart, eds., pp. 183-213, chapter 9, Cambridge Univ. Press, 2005.
[40] NIST, Digital Hash Standard, Fed. Information Processing Standards (FIPS) Publication 180-1, Apr. 1995.
[41] R. Granger, D. Page, and M. Stam, "A Comparison of CEILIDH and XTR," Algorithmic Number Theory: Sixth Int'l Symp., ANTS-VI, pp. 235-249, Springer, 2004.
[42] H.W. Lim, "On the Application of Identity-Based Cryptography in Grid Security," PhD thesis, Univ. of London, 2006.
[43] P.S.L.M. Barreto, H.Y. Kim, B. Lynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," Advances in Cryptology—CRYPTO 2002, pp. 354-368, Springer-Verlag, 2002.
[44] P.S.L.M. Barreto, S.D. Galbraith, C. ÓhÉigeartaigh, and M. Scott, "Efficient Pairing Computation on Supersingular Abelian Varieties," Cryptology ePrint Archive, Report 2004/375,, Sept. 2005.
[45] R. Dingledine, "Tor: An Anonymous Internet Communication System," Proc. Workshop Vanishing Anonymity, the 15th Conf. Computers, Freedom, and Privacy, Apr. 2005.
[46] M. Blaze, J. Ioannidis, A.D. Keromytis, T. Malkin, and A. Rubin, "Anonymity in Wireless Broadcast Networks," Int'l J. Network Security, vol. 8, no. 1, pp. 37-51, Jan. 2009.
[47] X. Wu and N. Li, "Achieving Privacy in Mesh Networks," Proc. Fourth ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '06), pp. 13-22, Oct. 2006.
[48] T. Wu, Y. Xue, and Y. Chi, "Preserving Traffic Privacy in Wireless Mesh Networks," Proc. Int'l Symp. World of Wireless, Mobile and Multimedia Networks (WoWMoM '06), 2006.
[49] Z. Wan, K. Ren, B. Zhu, B. Preneel, and M. Gu, "Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks," Proc. ASIAN ACM Symp. Information, Computer and Comm. Security (ASIACCS '09), pp. 368-371, Mar. 2009.
[50] S. Buchegger and J.L. Boudec, "The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks," Proc. Workshop Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt '03), Mar. 2003.
[51] Y. Zhang and Y. Fang, "A Fine-Grained Reputation System for Reliable Service Selection in Peer-to-Peer Networks," IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 8, pp. 1134-1145, Aug. 2007.
[52] S. Zhong, J. Chen, and Y. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, vol. 3, pp. 1987-1997, Apr. 2003.
[53] Y. Zhang, W. Lou, W. Liu, and Y. Fang, "A Secure Incentive Protocol for Mobile Ad Hoc Networks," ACM Wireless Networks, vol. 13, no. 5, pp. 569-582, Oct. 2007.
4 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool