Presentation is loading. Please wait.

Presentation is loading. Please wait.

l-ppt. By Y11mc24047 SAT: A Security Architecture Achieving Anonimity And Traceability In Wireless Mesh Networks.

Similar presentations


Presentation on theme: "l-ppt. By Y11mc24047 SAT: A Security Architecture Achieving Anonimity And Traceability In Wireless Mesh Networks."— Presentation transcript:

1 http://www.scribd.com/doc/90781041/fina l-ppt

2 By Y11mc24047 SAT: A Security Architecture Achieving Anonimity And Traceability In Wireless Mesh Networks

3 Index Terms:  Anonymity.  Traceability.  Pseudonym.  Misbehavior.  Revocation.  Wireless mesh network (WMN).

4  Objectives.  Methodologies.  Implementation.  Resultant. Agenda:

5 Abstract: Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and peer-to-peer (P2P) systems.

6 Introduction Wireless Mesh Network (WMN) is a promising technology and is expected to be widespread due to its low investment feature and the wireless broadband services it supports, attractive to both service providers and users.

7 Existing System In wireless communication systems, it is easier for a global observer to mount traffic analysis attacks by following the packet forwarding path than in wired networks. Thus, routing anonymity is indispensable, which conceals the confidential communication relationship of two parties by building an anonymous path between them.

8 Proposed System We are motivated by resolving the above security conflicts, namely anonymity and traceability, in the emerging WMN communication systems. We have proposed the initial design of our security architecture, where the feasibility and applicability of the architecture were not fully understood. As a result, we provide detailed efficiency analysis in terms of storage, communication, and computation.

9 ARCHITECTURE

10 Modules:  Wireless mesh networks.  Blind Signature.  Ticket Issuance.  Fraud Detection.  Fundamental security objectives.

11 Wireless Mesh Networks: The wireless mesh backbone consists of mesh routers(MRs) and gateways (GWs)interconnected by ordinary wireless links.Mesh routers and gateways serve as the access points of the WMN and the last resorts to the Internet.

12

13 Blind Signature: A blind signature scheme allows a receiver to obtain a signature on a message such that both the message and the resulting signature remain unknown to the signer.

14 Ticket Issuance: In order to maintain security of the network against attacks and the fairness among clients, the home server manager may control the access of each client by issuing tickets based on the misbehavior history of the client.

15 Fraud Detection: Fraud is used interchangeably with misbehavior in this paper, which is essentially an insider attack. Ticket reuse generally results from the client’s inability to obtain tickets from the TA when network access is desired.

16 Fundamental Security Objectives: It is trivial to show that our security architecture satisfies the security requirements for authentication, data integrity, and confidentiality,which follows directly from the employment of the standard cryptographic primitives.

17 anonymity (noun) a state of being unknown; namelessness; lacking individuality. If a person likes to remain unknown, they like anonymity. Anonymity is a situation in which a person's name, either on their request, or for any other reason, is kept a secret. A large number of people living in a group in which none of them are extraordinary in any way, live in anonymity. No one among them has individuality. The famous writer of satires Jonathan Swift, of Gulliver's Travels fame, had his earlier books published in anonymity. Only later did people come to know that he was the author of those highly imaginative works. Today, even in affluent countries, a large number of people live in anonymity, at subsistence levels, in slums.

18 Traceability refers to the completeness of the information about every step in a process chain. process chain The formal definition of traceability is the ability to chronologically interrelate uniquely identifiable entities in a way that is verifiable. Traceability is the ability to verify the history, location, or application of an item by means of documented recorded identification. [1] [1]

19 Traceability Server is provided by the security component which allows secure access to the event and master data that is stored in the IBM InfoSphere Traceability Server. Security policies define the types of queries that can be run and the data that can be accessed when those queries are run. A security policy is associated with a user group that is defined in the IBM WebSphere Application Server. Only users in that user group are allowed to run the queries and access the data that is specified in the policy. When queries are run, the security component intercepts the query, and, if necessary, modifies it so that some of the resultant data is either discarded or changed to NULL values

20

21 Uml Diagrams Use case Admin Login view misuses view blind message client4make transaction send and receive messages Start server client1 client2 client3

22 Sequence Diagram: Admin Enter data to insert and delete Enter username and password view misuses view blind messages LOGIN client2client1start server client3client4 Start start start start

23 Activity Diagram Adminloginview blind messageview misuses Start serverclient2client4Client1client3Make transaction

24 Component Diagram View blind message view misuses Admin Login enter user name and password start server client1client2client3client4Make transaction send and receive messages.

25 Conclusion: we propose SAT, a security architecture mainly consisting of the ticket-based protocols, which resolves the conflicting security requirements of unconditional anonymity for honest users and traceability of misbehaving users. By utilizing the tickets, self-generated pseudonyms, and the hierarchical identity-based cryptography, the proposed architecture is demonstrated to achieve desired security objectives and efficiency.


Download ppt "l-ppt. By Y11mc24047 SAT: A Security Architecture Achieving Anonimity And Traceability In Wireless Mesh Networks."

Similar presentations


Ads by Google