Abstract
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conventional network non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but in ad hoc networks due to mobility problem we can’t use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satisfies non-repudiation requirements emerged by the application in a peer-to-peer network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks
Yu, S., Zhang, Y., Song, C., Chen, K.: A security archi tecture for Mobile Ad Hoc Networks
Robinson, P., Cook, N., Shrivastava, S.: Implementing Fair Non-repudiable Interactions with Web Services. In: Proceedings of the 2005 Ninth IEEE International EDOC Enterprise Computing Conference, EDOC 2005, 0-7695-2441-9/05 (2005)
Santiago, J., Vigneron, L.: Study for Automatically Analysing Non-repudiation. ACI Sécurité SATIN and the IST-2001-39252 AVISPA project
Lin, Y.-C., Slay, J.: Non-Repudiation in Pure Mobile Ad Hoc Network
Kremer, S., Markowitch, O., Zhou, J.: An Intensive Survey of Fair Non-Repudiation Protocols, April 23. Elsevier Science, Amsterdam (2002)
Zhou, J., Gollmann, D.: A Fair Non-repudiation Protocol. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy (SP 1996), pp. 1081–6011/96 (1996)
Conrad, M.: Nonrepudiation mechanisms for Peer-to-Peer networks. ACM portal (2006)
Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Elsevier Computer Networks 53, 2022–2037 (2009)
Alzaid, H., Foo, E., Nieto, J.G.: Secure Data Aggregation in Wireless Sensor Network: a survey. In: Proc. 6th Australasian Information Security Conference (AISC 2008), Wollongong, Australia. CRPIT, vol. 81 (2008)
Bayya, A.K., Gupte, S., Shukla, Y.K., Garikapati, A.: Security in Ad-hoc Networks
Huang, S.-I., Shieh, S., Tygar, J.D.: Secure encrypted-data aggregation for wireless sensor networks. Springer Science+Business Media, LLC 2009, Wireless Netw. (2010) 16, 915–927 (2009)
Sang, Y., Shen, H.: Secure Data Aggregation in Wireless Sen sor Networks: A Survey. In: IEEE Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006, pp. 0-7695-2736-1/06 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tandel, P., Valiveti, S., Agrawal, K.P., Kotecha, K. (2010). Non-Repudiation in Ad Hoc Networks. In: Kim, Th., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17604-3_48
Download citation
DOI: https://doi.org/10.1007/978-3-642-17604-3_48
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17603-6
Online ISBN: 978-3-642-17604-3
eBook Packages: Computer ScienceComputer Science (R0)