SAT: A security architecture achieving anonymity and traceability in wireless mesh networks

Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fang

Research output: Contribution to journalArticle

39 Citations (Scopus)

Abstract

Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality, data integrity, and nonrepudiation. Thorough analysis on security and efficiency is incorporated, demonstrating the feasibility and effectiveness of the proposed architecture.

Original languageEnglish (US)
Article number5374418
Pages (from-to)295-307
Number of pages13
JournalIEEE Transactions on Dependable and Secure Computing
Volume8
Issue number2
DOIs
StatePublished - 2011

Fingerprint

Wireless mesh networks (WMN)
Authentication

Keywords

  • Anonymity
  • misbehavior
  • pseudonym
  • revocation
  • traceability
  • wireless mesh network (WMN)

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

SAT : A security architecture achieving anonymity and traceability in wireless mesh networks. / Sun, Jinyuan; Zhang, Chi; Zhang, Yanchao; Fang, Yuguang.

In: IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 2, 5374418, 2011, p. 295-307.

Research output: Contribution to journalArticle

@article{a6809451c5b14ea88944d1e9ff0ed54a,
title = "SAT: A security architecture achieving anonymity and traceability in wireless mesh networks",
abstract = "Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality, data integrity, and nonrepudiation. Thorough analysis on security and efficiency is incorporated, demonstrating the feasibility and effectiveness of the proposed architecture.",
keywords = "Anonymity, misbehavior, pseudonym, revocation, traceability, wireless mesh network (WMN)",
author = "Jinyuan Sun and Chi Zhang and Yanchao Zhang and Yuguang Fang",
year = "2011",
doi = "10.1109/TDSC.2009.50",
language = "English (US)",
volume = "8",
pages = "295--307",
journal = "IEEE Transactions on Dependable and Secure Computing",
issn = "1545-5971",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

TY - JOUR

T1 - SAT

T2 - A security architecture achieving anonymity and traceability in wireless mesh networks

AU - Sun, Jinyuan

AU - Zhang, Chi

AU - Zhang, Yanchao

AU - Fang, Yuguang

PY - 2011

Y1 - 2011

N2 - Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality, data integrity, and nonrepudiation. Thorough analysis on security and efficiency is incorporated, demonstrating the feasibility and effectiveness of the proposed architecture.

AB - Anonymity has received increasing attention in the literature due to the users' awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been devoted to wireless mesh networks (WMNs). On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality, data integrity, and nonrepudiation. Thorough analysis on security and efficiency is incorporated, demonstrating the feasibility and effectiveness of the proposed architecture.

KW - Anonymity

KW - misbehavior

KW - pseudonym

KW - revocation

KW - traceability

KW - wireless mesh network (WMN)

UR - http://www.scopus.com/inward/record.url?scp=78751651500&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78751651500&partnerID=8YFLogxK

U2 - 10.1109/TDSC.2009.50

DO - 10.1109/TDSC.2009.50

M3 - Article

VL - 8

SP - 295

EP - 307

JO - IEEE Transactions on Dependable and Secure Computing

JF - IEEE Transactions on Dependable and Secure Computing

SN - 1545-5971

IS - 2

M1 - 5374418

ER -