An Architecture to Achieve Anonymity and Traceability

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 1, Issue 4

Abstract

 Anonymity has received increasing attention in the literature due to the users’ awareness of their privacy nowadays. Anonymity provides protection for users to enjoy network services without being traced. On the other hand, the network authority requires conditional anonymity such that misbehaving entities in the network remain traceable. In this paper, we propose a security architecture to ensure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. The proposed architecture strives to resolve the conflicts between the anonymity and traceability objectives, in addition to guaranteeing fundamental security requirements including authentication, confidentiality, data integrity, and nonrepudiation.

Authors and Affiliations

S Reshma

Keywords

Related Articles

 Evaluate the Effectiveness of Test Suite Prioritization Techniques Using APFD Metric

 Abstract: Regression testing is a testing activity that is performed to provide confidence that changes do not  harm the existing behavior of the software. Test suites tend to grow in size as software evolves...

A Review on Systematic Quality Software Designing and DevelopmentPractices

Abstract: Software Engineering process, technology and the results cover the definition of suitable models for the environment to ensure its quality.Any software development project is very important to create quality so...

 Color Based Image Retrieval System

 Advances in the data storage and image acquisition technologies have enabled the creation of large datasets. It is necessary to develop appropriate information systems to efficiently manage these collections. T...

 A Web Extraction Using Soft Algorithm for Trinity Structure

 Abstract: Trinity is a structure for automatically fetch or extract or segment the content from the website or thewebpages by the source of internet. The required applications are done by the trinity nature in orde...

 Prevention of SQL Injection Attacks having XML Database

 XML-based Web applications are broadly utilized in computer world, whose main applications are remote operation performance and bring arbitrary data. It is recently used in cloud interfaces, E-Government,  ...

Download PDF file
  • EP ID EP87487
  • DOI -
  • Views 174
  • Downloads 0

How To Cite

S Reshma (2013).  An Architecture to Achieve Anonymity and Traceability. IOSR Journals (IOSR Journal of Computer Engineering), 1(4), 33-38. https://europub.co.uk/articles/-A-87487