18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

G → N 8 : E k8 (E k9 (E k3 (E k10 (E k6 (E k11 (G, pad, E G (nonce)), N 11 , down 6 ), N 6 , pad),<br />

N 10 , down 3 ), N 3 , pad), N 9 , pad)<br />

N 8 → N 9 : E k9 (E k3 (E k10 (E k6 (E k11 (G, pad, E G (nonce)), N 11 , down 6 ), N 6 , pad),<br />

N 10 , down 3 ), N 3 , pad)<br />

N 9 → N 3 : E k3 (E k10 (E k6 (E k11 (G, pad, E G (nonce)), N 11 , down 6 ), N 6 , pad),<br />

N 10 , down 3 )<br />

N 3 → N 10 : E k10 (E k6 (E k11 (G, pad, E G (nonce)), N 11 , down 6 ), N 6 , pad)<br />

N 10 → N 6 : E k6 (E k11 (G, pad, E G (nonce)), N 11 , down 6 )<br />

N 6 → N 11 : E k11 (G, pad, E G (nonce))<br />

N 11 → G : E G (nonce)<br />

4. Uplink Phase<br />

In the uplink phase, mesh no<strong>de</strong>s send uplink data to gateway anonymously. If a<br />

no<strong>de</strong> has any uplink data to send, it employs the same approach used to make access requests.<br />

They wait for an uplink carrier arrives, insert the <strong>de</strong>sired data, and then chooses a<br />

random no<strong>de</strong> to forward the carrier. After visiting r hops, the carrier is sent back to gateway<br />

which performs the protocol check, in the same way as <strong>de</strong>scribed in the access phase.<br />

After visiting r no<strong>de</strong>s of a random route, N 1 , N 2 , . . . , N r , an uplink carrier has the following<br />

format: E kr (...E k2 (E k1 (uplink 1 ), uplink 2 )..., uplink r ), E G (k 1 )‖E G (k 2 )‖...‖E G (k r ).<br />

Note that in all protocol phases we have inclu<strong>de</strong>d mechanisms to enable various<br />

no<strong>de</strong>s to anonymously communicate using a single packet. This is a feature WuLi’s protocol<br />

fails to provi<strong>de</strong> [Wu and Li 2006]. In their both schemes, when two or more no<strong>de</strong>s<br />

make a request, always the no<strong>de</strong> closer to the gateway gets granted, since it replaces the<br />

onion. In a networks with a large number of no<strong>de</strong>s, such as metropolitan-scale WMNs,<br />

this turns out to be a real concern, because simultaneously communication is very likely<br />

to occur.<br />

3.5. Sketch of Security Analysis<br />

The security of our protocol is based on the uniform behaviour of mesh no<strong>de</strong>s while<br />

following the protocol. That is, the activities for an active no<strong>de</strong> is indistinguishable from<br />

the activities of an inactive one. This is achieved by employing modified onion routing<br />

schemes associated with redundancy and padding techniques. No<strong>de</strong>s may either encrypt<br />

or <strong>de</strong>crypt onions according to the protocol phase. Padding bits are inclu<strong>de</strong>d into the<br />

onion to <strong>de</strong>fend against message’s size attacks. Redundancy, in turn, is the key technique<br />

for achieving anonymity. That is, packets visit several mesh no<strong>de</strong>s, so that an active one<br />

is hid<strong>de</strong>n among them. Hence, the anonymity level achieved can be measured by the<br />

number of redundant no<strong>de</strong>s involved in a given protocol phase. In other words, the more<br />

no<strong>de</strong>s the network has, the better the anonymity level will be. However, a large number<br />

of no<strong>de</strong>s would introduce relevant overhead over the network performance.<br />

In addition, onion routing techniques also provi<strong>de</strong>s privacy to mesh no<strong>de</strong>s’ data,<br />

since each layer is encrypted with a shared symmetric key. The security of the data is<br />

then guaranteed by the un<strong>de</strong>rline symmetric cryptosystem. In setup phase, more sophisticated<br />

key agreement protocol, such as [Wan et al. 2009], may be employed to establish<br />

more secure symmetric keys. Asymmetric cryptography is also employed to secure other<br />

346

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!