Identity Deployment and Management in Wireless Mesh Networks

  • Leonardo A. Martucci
  • Albin Zuccato
  • Simone Fischer-Hübner
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 262)


This paper introduces the problem of combining security and privacy-friendly provisioning in wireless mesh network environments. We present a set of non-functional requirements for a privacy-friendly identity management (IdM) system suitable for wireless mesh networks and derive another set of security and privacy properties for digital identifiers to be used in such networks. Later, we compare two existing identifiers, anonymous attribute certificates and anonymous credentials, and verify if any of those conforms to our set of defined properties. A business model and some business cases are presented to support and justify the need for a privacy-friendly IdM system not only from the security and privacy perspective, but also from a business-enabler perspective.


Business Case Wireless Mesh Network Sybil Attack Wireless Relay Anonymous Credential 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    ITU-T Recommendation X.509, The Directory: public-key and attribute certificate frameworks. Recommendation X.509 — International Telecommunications Union, The International Telegraph and Telephone Consultative Committee, Data Communication Networks: Open Systems Interconnection (OSI); Security, Structure and Applications, Aug 2005.Google Scholar
  2. 2.
    IEEE P802.11 TGs. Status of Project IEEE 802.11s, Mar 2007. See http://www. Scholar
  3. 3.
    Matthias Bauer, Martin Meints, and Marit Hansen. D3.1: Structured Overview on Prototypes and Concepts of Identity Management Systems. Technical report, FIDIS — Future of Identity in the Information Society, 15 Sep 2005.Google Scholar
  4. 4.
    Vicente Benjumea, Javier Lopez, and Jose Maria Troya. Anonymous Attribute Certificates based on Traceable Signatures. Internet Research: Electronic Networking Applications and Policy. Special Issue on Privacy and Anonymity in the Digital Era: Theory, Technologies and Practice, 16(2): 120–139, 2006.Google Scholar
  5. 5.
    Jan Camenisch. Efficient Private Credential Systems and Applications: Cryptography for Privacy — Credential+ Systems. 3rd FIDIS Doctoral Consortium Event, Stockholm, Sweden, 9–13 Aug 2006.Google Scholar
  6. 6.
    Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich. How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 2006), 30 Oct-3 Nov 2006.Google Scholar
  7. 7.
    Jan Camenisch and Anna Lysyanskaya. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT 2001), volume 2045 of Lecture Notes in Computer Science, pages 93-118. Springer, 2001.Google Scholar
  8. 8.
    Jan Camenisch and Anna Lysyanskaya. A Signature Scheme with Efficient Protocols. In Security in Communication Networks: Third International Conference (SCN 2002), volume 2576/2003 of Lecture Notes in Computer Science, pages 268-289, Amalfi, Italy, 12–13 Sep 2002. Springer Berlin/Heidelberg, LNCS 2576.Google Scholar
  9. 9.
    Jan Camenisch and Markus Stadler. Proof systems for general statements about discrete logarithms. Technical Report TR 260, Institute for Theoretical Computer Science, ETH Zürich, Mar 1997.Google Scholar
  10. 10.
    John R. Douceur. The Sybil Attack. In P. Druschel, F. Kaashoek, and A. Rowstron, editors, Peer-to-Peer Systems: Proceedings of the 1st International Peer-to-Peer Systems Workshop (IPTPS), volume 2429, pages 251-260. Springer-Verlag, 7–8 Mar 2002.Google Scholar
  11. 11.
    Marco Gruteser and Dirk Grunwald. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis. In Parviz Kermani, editor, Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH 2003), 19 Sep 2003.Google Scholar
  12. 12.
    Leonardo A. Martucci. The Identity Anonymity Paradox: on the Relationship between Identification, Anonymity and Security in Mobile Ad Hoc Networks, Licentiate Thesis, Karlstad University Studies 2006:36, September 2006.Google Scholar
  13. 13.
    Andreas Pfitzmann and Marit Hansen. Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management — A Consolidated Proposal for Terminology v0.30, 26 Nov 2007. See literatur/.Google Scholar
  14. 14.
    Claus P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239–252, 1991.CrossRefMATHGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Leonardo A. Martucci
    • 1
  • Albin Zuccato
    • 2
  • Simone Fischer-Hübner
    • 1
  1. 1.Department of Computer ScienceKarlstads UniversitySweden
  2. 2.R&D Informations SecurityTeliaSoneraSweden

Personalised recommendations