18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[Wu and Li 2006] which claims to <strong>de</strong>fend against those attacks, assuming a global and<br />

aggressive adversary. However, their solution is vulnerable to a number of attacks due<br />

to problems in the protocol <strong>de</strong>sign, which were pointed out by the authors. We propose<br />

a new protocol based on some of Wu and Li’s i<strong>de</strong>as. However, our solution does not<br />

suffer from the problems of the former proposal. In addition, it enables multiple no<strong>de</strong>s<br />

to communicate using a single data carrier, which makes our scheme more effective than<br />

Wu and Li’s proposal, namely WuLi.<br />

This paper is organized as follows: the next section presents an outline of WuLi’s<br />

scheme and its drawbacks. After that, in Section 3, we present our new protocol. Next,<br />

we sketch the security analysis of our solution. Section 4 presents the works related to<br />

our solution. Finally, in Section 5, we conclu<strong>de</strong> this work.<br />

2. A Summary of WuLi’s Proposal and Its Drawbacks<br />

In or<strong>de</strong>r to provi<strong>de</strong> anonymous communication in WMN, WuLi proposed the private<br />

onion ring protocol. In that protocol, they applied the concept of onion routing<br />

[Syverson et al. 1997] to obtain data confi<strong>de</strong>ntiality and to achieve source anonymity.<br />

The entire protocol relies on the security of the so-called private onion ring, which is<br />

an anonymously constructed route for no<strong>de</strong>s’ communication. As the name suggests, the<br />

route has a ring topology, where the gateway is both the beginning and the end of it. Before<br />

presenting this topology, they proposed an open route approach. In this approach,<br />

the communication starts at the gateway and could end at any mesh no<strong>de</strong>. However, the<br />

approach had a serious anonymity vulnerability, which were solved by employing the ring<br />

solution.<br />

Their protocol works as follows. First, the gateway sends an request carrier to<br />

the first no<strong>de</strong> of the ring. Each no<strong>de</strong> encrypts the carrier (using a symmetric key shared<br />

between the no<strong>de</strong> and the gateway) and then forwards it to the next hop in the ring. When a<br />

no<strong>de</strong> wants to make an access request, it replaces the carrier with a new one containing its<br />

request. If more than one no<strong>de</strong> tries to request access in the same access session, always<br />

the no<strong>de</strong> closer to the gateways gets granted, since the requester erases the previous ones.<br />

After knowing the requester, the gateway sends a downlink onion through the ring, in<br />

or<strong>de</strong>r to provi<strong>de</strong> the requested data. No<strong>de</strong>s peel off one layer and forward the onion to<br />

another hop. When the onion arrives at the active no<strong>de</strong>, it obtains the plain downlink data,<br />

and then replaces it with uplink data. After that, the active no<strong>de</strong> encrypts the onion and<br />

sends it to the next hop. These procedures continue until the onion returns to the gateway.<br />

WuLi’s private onion ring solution overcomes the drawbacks of the open route<br />

approach. However, the ring topology still have some problems. The rings established by<br />

the gateway make the route fixed and easy for an adversary launching privacy attacks. In<br />

addition, if a no<strong>de</strong> goes down, a new ring must be re-established. This topology dynamics<br />

may make the scheme too inefficient. Malicious no<strong>de</strong>s could also utilize it to launch<br />

powerful DoD attacks against the WMN. Besi<strong>de</strong>s, ring route is vulnerable to the so-called<br />

intersection attacks based on user profile. This vulnerability is pointed out by the authors<br />

as the main problem of the protocol: “Assume that a Mesh no<strong>de</strong> initiates a session to<br />

connect to an Internet address through a ring. Later it is inclu<strong>de</strong>d in new ring, through<br />

which it visits the same address again. Both visits are observed by the adversary that<br />

monitors the Gateway router. If the address only has very special visitors, based on the<br />

340

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!