On the Security of a
Ticket-Based Anonymity System with Traceability Property in Wireless Mesh
Networks
ABSTRACT:
In 2011, Sun et al. [5] proposed a
security architecture to ensure unconditional anonymity for honest users and
traceability of misbehaving users for network authorities in wireless mesh
networks (WMNs). It strives to resolve the conflicts between the anonymity and
traceability objectives. In this paper, we attacked Sun et al. scheme’s
traceability. Our analysis showed that trusted authority (TA) cannot trace the
misbehavior client (CL) even if it double-time deposits the same ticket.
EXISTING
SYSTEM:
In the existing system, it is difficult to
resolve the conflicts between the anonymity and traceability objectives.
PROPOSED
SYSTEM:
In the Propose system, we attacked Sun
et al. scheme’s traceability. Our analysis showed that trusted authority (TA)
cannot trace the misbehavior client (CL) even if it double-time deposits the
same ticket.
MODULES:
ü Wireless
mesh networks (WMNs)
ü Blind
Signature
ü Ticket
Issuance
ü Fraud
Detection
ü Fundamental
security objectives
MODULE
DESCRIPTION:
Wireless
mesh networks (WMNs)
The
wireless mesh backbone consists of mesh routers (MRs) and gateways (GWs)
interconnected by ordinary wireless links (shown as dotted curves). Mesh
routers and gateways serve as the access points of the WMN and the last resorts
to the Internet, respectively. Each WMN domain, or trust domain (to be used
interchangeably) is managed by a domain administrator that serves as a trusted
authority the central server of a campus WMN.
Blind Signature
In general, a blind signature scheme allows a
receiver to obtain a signature on a message such that both the message and the
resulting signature remain unknown to the signer. We refer the readers for a
formal definition of a blind signature scheme, which should bear the properties
of verifiability, unlinkability, and unforgeability. Blind signature scheme,
where the restrictiveness property is incorporated into the blind signature
scheme such that the message being signed must contain encoded information. As
the name suggests, this property restricts the user in the blind signature
scheme to embed some account-related secret information into what is being
signed by the bank (otherwise, the signing will be unsuccessful) such that this
secret can be recovered by the bank to identify a user if and only if he
double-spends. The restrictiveness property is essentially the guarantee for
traceability in the restrictive blind signature systems.
Ticket Issuance
In
order to maintain security of the network against attacks and the fairness
among clients, the home server manager may control the access of each client by
issuing tickets based on the misbehavior history of the client, which reflects
the server manager’s confidence about the client to act properly. Ticket
issuance occurs when the client initially attempts to access the network or
when all previously issued tickets are depleted. The client needs to reveal his
real ID to the server manager in order to obtain a ticket since the server
manager has to ensure the authenticity of this client.
Fraud Detection
Fraud
is used interchangeably with misbehavior in this paper, which is essentially an
insider attack. Ticket reuse generally results from the client’s inability to
obtain tickets from the TA when network access is desired, primarily due to the
client’s past misbehavior, which causes the server manager to constrain his
ticket requests.
Fundamental security objectives
It is trivial to show
that our security architecture satisfies the security requirements for
authentication, data integrity, and confidentiality, which follows directly
from the employment of the standard cryptographic primitives, message
authentication code, and encryption, in our system. We are only left with the
proof of non-repudiation in this category. A fraud can be repudiated only if
the client can provide a different representation, he knows of message from
what is derived by the server manager. If the client has misbehaved, the representation
he knows will be the same as the one derived by the server Manager which
ensures non-repudiation.
SYSTEM specification:
Hardware Requirements:
•
System : Pentium IV 2.4 GHz.
•
Hard
Disk : 40 GB.
•
Floppy
Drive : 1.44 Mb.
•
Monitor : 15 VGA Colour.
•
Mouse : Logitech.
•
Ram : 256 Mb.
Software Requirements:
•
Operating system : Windows XP
Professional
•
Front End : JAVA, Swing(JFC),J2ME
•
Tool : Sun Java Wireless Toolkit 2.5.2 (J2ME Code)
REFERENCE:
Huaqun Wang and Yuqing Zhang, Member,
IEEE,” On the Security of a Ticket-Based Anonymity System with Traceability
Property in Wireless Mesh Networks” IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012.