18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

the authors work on a 3-tier architecture and propose a secure mechanism to anonymously<br />

authenticate mesh clients to mesh routers. To achieve this, they employ Chaum’s blind<br />

signature scheme. However, their solution only works if the communication between<br />

mesh clients and routers are single-hop. Based on this same architecture, a recent work<br />

[Wan et al. 2009] presents two protocols for privacy protection in WMN in a metropolitan<br />

scale. In a basic protocol, group signatures are used to authenticate mesh clients to mesh<br />

routers. This approach achieves privacy against eavesdroppers, but it reveals the client’s<br />

i<strong>de</strong>ntity to mesh routers. To solve this, the authors propose an advanced protocol which<br />

uses pairwise shared secrets along with group signatures to keep mesh clients anonymous<br />

from mesh routers.<br />

5. Conclusion<br />

This work presented a solution based on some of the principles employed by Wu and Li’s<br />

protocol to address the challenge of achieving anonymous communication in WMN. The<br />

solution avoids that a no<strong>de</strong> directly sends data to the gateway router. Instead, it waits for a<br />

token to arrive and, thus, anonymously communicating. Our protocol makes it difficulty<br />

for an adversary launching the so-called intersection attack, due to the non-<strong>de</strong>terministic<br />

feature of the routing protocol. In addition, we have produced a more effective solution,<br />

since mesh no<strong>de</strong>s can simultaneously communicate with the gateway within the same<br />

session.<br />

Acknowledgment - This work was partially supported by SEDEC and FAPESPA.<br />

References<br />

Akyildiz, I. F., Wang, X., and Wang, W. (2005).<br />

Computer Networks, 47(4):445–487.<br />

Wireless mesh networks: a survey.<br />

Daemen, J. and Rijmen, V. (2002). The Design of Rijndael: AES - The Advanced Encryption<br />

Standard. Springer.<br />

Gamal, T. E. (1985). A public key cryptosystem and a signature scheme based on discrete<br />

logarithms. IEEE Transactions on Information Theory, 31(4):469–472.<br />

Islam, S., Hamid, A., Hong, C. S., and Chang, B.-H. (2008). Preserving i<strong>de</strong>ntity privacy in<br />

wireless mesh networks. In Information Networking, 2008. ICOIN 2008. International<br />

Conference on, pages 1 –5.<br />

Li, R., Pang, L., Pei, Q., and Xiao, G. (2009). Anonymous communication in wireless<br />

mesh network. In CIS (2), pages 416–420. IEEE Computer Society.<br />

Syverson, P. F., Goldschlag, D. M., and Reed, M. G. (1997). Anonymous connections<br />

and onion routing. In IEEE Symposium on Security and Privacy, pages 44–54. IEEE<br />

Computer Society.<br />

Wan, Z., Ren, K., Zhu, B., Preneel, B., and Gu, M. (2009). Anonymous user communication<br />

for privacy protection in wireless metropolitan mesh networks. In Proceedings<br />

of the 4th International Symposium on Information, Computer, and Communications<br />

Security, ASIACCS ’09, pages 368–371, New York, NY, USA. ACM.<br />

Wu, T., Xue, Y., and Cui, Y. (2006). Preserving traffic privacy in wireless mesh networks.<br />

In WOWMOM, pages 459–461. IEEE Computer Society.<br />

Wu, X. and Li, N. (2006). Achieving privacy in mesh networks. In SASN, pages 13–22.<br />

348

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!