![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
TAB-Ticketing and Blinding for Realizing Anonymity and Traceability in Wireless Mesh Networks
Subscribe/Renew Journal
In this architecture, the conflicts between anonymity and traceability is resolved. Anonymity has received increased attention due to the users awareness of their privacy nowadays. Anonymity can be implemented to make it impossible or very difficult to find out the real author of a message. A common variant of anonymity is pseudonymity. But due to anonymity service, the misbehaving user remains untraced. So, a security architecture is proposed to ensure unconditionally anonymity for honest user and conditional anonymity for misbehaving user in wireless mesh networks. To achieve this ticketing and blinding technique is used. In addition to anonymity and traceability, other requirements such as efficiency, feasibility and effectiveness is also resolved.
Keywords
Anonymity, Traceability, Ticket Reuse, Multiple Deposit, Wireless Mesh Network (WMN).
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 261
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 3