Follow us on Facebook

Header Ads

On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks

On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks

ABSTRACT:

In 2011, Sun et al. [5] proposed a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in wireless mesh networks (WMNs). It strives to resolve the conflicts between the anonymity and traceability objectives. In this paper, we attacked Sun et al. scheme’s traceability. Our analysis showed that trusted authority (TA) cannot trace the misbehavior client (CL) even if it double-time deposits the same ticket.

EXISTING SYSTEM:

In the existing system, it is difficult to resolve the conflicts between the anonymity and traceability objectives.

PROPOSED SYSTEM:

In the Propose system, we attacked Sun et al. scheme’s traceability. Our analysis showed that trusted authority (TA) cannot trace the misbehavior client (CL) even if it double-time deposits the same ticket.


MODULES:

ü Wireless mesh networks (WMNs)
ü Blind Signature
ü Ticket Issuance
ü Fraud Detection
ü Fundamental security objectives

MODULE DESCRIPTION:
Wireless mesh networks (WMNs)
The wireless mesh backbone consists of mesh routers (MRs) and gateways (GWs) interconnected by ordinary wireless links (shown as dotted curves). Mesh routers and gateways serve as the access points of the WMN and the last resorts to the Internet, respectively. Each WMN domain, or trust domain (to be used interchangeably) is managed by a domain administrator that serves as a trusted authority the central server of a campus WMN.

Blind Signature
 In general, a blind signature scheme allows a receiver to obtain a signature on a message such that both the message and the resulting signature remain unknown to the signer. We refer the readers for a formal definition of a blind signature scheme, which should bear the properties of verifiability, unlinkability, and unforgeability. Blind signature scheme, where the restrictiveness property is incorporated into the blind signature scheme such that the message being signed must contain encoded information. As the name suggests, this property restricts the user in the blind signature scheme to embed some account-related secret information into what is being signed by the bank (otherwise, the signing will be unsuccessful) such that this secret can be recovered by the bank to identify a user if and only if he double-spends. The restrictiveness property is essentially the guarantee for traceability in the restrictive blind signature systems.

Ticket Issuance
In order to maintain security of the network against attacks and the fairness among clients, the home server manager may control the access of each client by issuing tickets based on the misbehavior history of the client, which reflects the server manager’s confidence about the client to act properly. Ticket issuance occurs when the client initially attempts to access the network or when all previously issued tickets are depleted. The client needs to reveal his real ID to the server manager in order to obtain a ticket since the server manager has to ensure the authenticity of this client.

Fraud Detection
Fraud is used interchangeably with misbehavior in this paper, which is essentially an insider attack. Ticket reuse generally results from the client’s inability to obtain tickets from the TA when network access is desired, primarily due to the client’s past misbehavior, which causes the server manager to constrain his ticket requests.

Fundamental security objectives
 It is trivial to show that our security architecture satisfies the security requirements for authentication, data integrity, and confidentiality, which follows directly from the employment of the standard cryptographic primitives, message authentication code, and encryption, in our system. We are only left with the proof of non-repudiation in this category. A fraud can be repudiated only if the client can provide a different representation, he knows of message from what is derived by the server manager. If the client has misbehaved, the representation he knows will be the same as the one derived by the server Manager which ensures non-repudiation.

SYSTEM specification:
Hardware Requirements:
         System                 : Pentium IV 2.4 GHz.
         Hard Disk            : 40 GB.
         Floppy Drive       : 1.44 Mb.
         Monitor                : 15 VGA Colour.
         Mouse                  : Logitech.
         Ram                     : 256 Mb.

Software Requirements:
         Operating system           :  Windows XP Professional
         Front End             :  JAVA, Swing(JFC),J2ME
         Tool                    : Sun Java Wireless Toolkit 2.5.2 (J2ME                         Code)
REFERENCE:
Huaqun Wang and Yuqing Zhang, Member, IEEE,” On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012.