Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks

被引:16
|
作者
Wan, Zhiguo [1 ]
Ren, Kui [2 ]
Zhu, Bo [3 ]
Preneel, Bart [4 ]
Gu, Ming [1 ]
机构
[1] Tsinghua Univ, Sch Software, Tsinghua Natl Lab Informat Sci & Technol, Key Lab Informat Syst Secur,Minist Educ, Beijing 100084, Peoples R China
[2] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
[3] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ H3G 2W1, Canada
[4] Katholieke Univ Leuven, Dept Elect Engn, B-3001 Louvain, Belgium
基金
美国国家科学基金会;
关键词
Security; wireless networks;
D O I
10.1109/TVT.2009.2028892
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a combination of ad hoc networks and wireless local area network (WLAN), the wireless mesh network (WMN) provides a low-cost convenient solution to the last-mile network-connectivity problem. As such, existing route protocols designed to provide security and privacy protection for ad hoc networks are no longer applicable in WMNs. On the other hand, little research has focused on privacy-preserving routing for WMNs. In this paper, we propose two solutions for security and privacy protection in WMNs. The first scheme relies on group signatures, together with user credentials, to deliver security and privacy protection. By enforcing access control using user credentials, the user's identity has to be disclosed to mesh routers. To avoid this, our second scheme employs pairwise secrets between any two users to achieve stronger privacy protection. In the second scheme, the user is kept anonymous to mesh routers. Finally, we analyze these two schemes in terms of security, privacy, and performance.
引用
收藏
页码:519 / 532
页数:14
相关论文
共 50 条
  • [31] Authentication Protocol with Privacy Preservation for Handover in Wireless Mesh Networks
    Roy, Amit Kumar
    Khan, Ajoy Kumar
    FIRST INTERNATIONAL CONFERENCE ON SUSTAINABLE TECHNOLOGIES FOR COMPUTATIONAL INTELLIGENCE, 2020, 1045 : 383 - 395
  • [32] Optimized Flow Allocation for Anonymous Communication in Multipath Wireless Networks
    Yang, Chouchang
    Alomair, Basel
    Poovendran, Radha
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012, : 219 - 223
  • [33] Differential privacy protection on weighted graph in wireless networks
    Ning, Bo
    Sun, Yunhao
    Tao, Xiaoyu
    Li, Guanyu
    AD HOC NETWORKS, 2021, 110
  • [34] A survey on location privacy protection in Wireless Sensor Networks
    Jiang, Jinfang
    Han, Guangjie
    Wang, Hao
    Guizani, Mohsen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 125 : 93 - 114
  • [35] Supporting Business Privacy Protection in Wireless Sensor Networks
    Feng, Nan
    Hao, Zhiqi
    Yang, Sibo
    Wu, Harris
    JOURNAL OF SENSORS, 2016, 2016
  • [36] An Improved Anonymous Privacy Protection Model
    Yu, Hui
    She, Ming-Gao
    3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA 2017), 2017, : 118 - 124
  • [37] Latency-optimal communication in wireless mesh networks
    Xin, Qin
    Manne, Fredrik
    Yao, Xiaolan
    THEORETICAL COMPUTER SCIENCE, 2014, 528 : 79 - 84
  • [38] Mobile IP as an enabling technology for VoIP in metropolitan wireless mesh networks
    Arjona, Andres
    Ylae-Jaeaeski, Antti
    2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 2769 - +
  • [39] A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks
    Kumar, Pardeep
    Gurtov, Andrei
    Ylianttila, Mika
    Lee, Sang-Gon
    Lee, HoonJae
    ETRI JOURNAL, 2013, 35 (05) : 889 - 899
  • [40] Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation
    He, Debiao
    Wang, Ding
    Xie, Qi
    Chen, Kefei
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)