Abstract
This paper introduces the problem of combining security and privacy-friendly provisioning in wireless mesh network environments. We present a set of non-functional requirements for a privacy-friendly identity management (IdM) system suitable for wireless mesh networks and derive another set of security and privacy properties for digital identifiers to be used in such networks. Later, we compare two existing identifiers, anonymous attribute certificates and anonymous credentials, and verify if any of those conforms to our set of defined properties. A business model and some business cases are presented to support and justify the need for a privacy-friendly IdM system not only from the security and privacy perspective, but also from a business-enabler perspective.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
ITU-T Recommendation X.509, The Directory: public-key and attribute certificate frameworks. Recommendation X.509 — International Telecommunications Union, The International Telegraph and Telephone Consultative Committee, Data Communication Networks: Open Systems Interconnection (OSI); Security, Structure and Applications, Aug 2005.
IEEE P802.11 TGs. Status of Project IEEE 802.11s, Mar 2007. See http://www. ieee802.org/11/Reports/tgs_update.htm.
Matthias Bauer, Martin Meints, and Marit Hansen. D3.1: Structured Overview on Prototypes and Concepts of Identity Management Systems. Technical report, FIDIS — Future of Identity in the Information Society, 15 Sep 2005.
Vicente Benjumea, Javier Lopez, and Jose Maria Troya. Anonymous Attribute Certificates based on Traceable Signatures. Internet Research: Electronic Networking Applications and Policy. Special Issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice, 16(2): 120–139, 2006.
Jan Camenisch. Efficient Private Credential Systems and Applications: Cryptography for Privacy — Credential+ Systems. 3rd FIDIS Doctoral Consortium Event, Stockholm, Sweden, 9–13 Aug 2006.
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich. How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), 30 Oct-3 Nov 2006.
Jan Camenisch and Anna Lysyanskaya. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 2001), volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer, 2001.
Jan Camenisch and Anna Lysyanskaya. A Signature Scheme with Efficient Protocols. In Security in Communication Networks: Third International Conference (SCN 2002), volume 2576/2003 of Lecture Notes in Computer Science, pages 268-289, Amalfi, Italy, 12–13 Sep 2002. Springer Berlin/Heidelberg, LNCS 2576.
Jan Camenisch and Markus Stadler. Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH Zürich, Mar 1997.
John R. Douceur. The Sybil Attack. In P. Druschel, F. Kaashoek, and A. Rowstron, editors, Peer-to-Peer Systems: Proceedings of the 1st International Peer-to-Peer Systems Workshop (IPTPS), volume 2429, pages 251-260. Springer-Verlag, 7–8 Mar 2002.
Marco Gruteser and Dirk Grunwald. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. In Parviz Kermani, editor, Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH 2003), 19 Sep 2003.
Leonardo A. Martucci. The Identity Anonymity Paradox: on the Relationship between Identification, Anonymity and Security in Mobile Ad Hoc Networks, Licentiate Thesis, Karlstad University Studies 2006:36, September 2006.
Andreas Pfitzmann and Marit Hansen. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management — A Consolidated Proposal for Terminology v0.30, 26 Nov 2007. See http://dud.inf.tu-dresden.de/ literatur/.
Claus P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239–252, 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Martucci, L.A., Zuccato, A., Fischer-Hübner, S. (2008). Identity Deployment and Management in Wireless Mesh Networks. In: Fischer-Hübner, S., Duquenoy, P., Zuccato, A., Martucci, L. (eds) The Future of Identity in the Information Society. Privacy and Identity 2007. IFIP — The International Federation for Information Processing, vol 262. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79026-8_15
Download citation
DOI: https://doi.org/10.1007/978-0-387-79026-8_15
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-4629-4
Online ISBN: 978-0-387-79026-8
eBook Packages: Computer ScienceComputer Science (R0)