Skip to main content

Non-Repudiation in Ad Hoc Networks

  • Conference paper
Communication and Networking (FGCN 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 120))

Abstract

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conventional network non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but in ad hoc networks due to mobility problem we can’t use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satisfies non-repudiation requirements emerged by the application in a peer-to-peer network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhou, L., Haas, Z.J.: Securing Ad Hoc Networks

    Google Scholar 

  2. Yu, S., Zhang, Y., Song, C., Chen, K.: A security archi tecture for Mobile Ad Hoc Networks

    Google Scholar 

  3. Robinson, P., Cook, N., Shrivastava, S.: Implementing Fair Non-repudiable Interactions with Web Services. In: Proceedings of the 2005 Ninth IEEE International EDOC Enterprise Computing Conference, EDOC 2005, 0-7695-2441-9/05 (2005)

    Google Scholar 

  4. Santiago, J., Vigneron, L.: Study for Automatically Analysing Non-repudiation. ACI Sécurité SATIN and the IST-2001-39252 AVISPA project

    Google Scholar 

  5. Lin, Y.-C., Slay, J.: Non-Repudiation in Pure Mobile Ad Hoc Network

    Google Scholar 

  6. Kremer, S., Markowitch, O., Zhou, J.: An Intensive Survey of Fair Non-Repudiation Protocols, April 23. Elsevier Science, Amsterdam (2002)

    Google Scholar 

  7. Zhou, J., Gollmann, D.: A Fair Non-repudiation Protocol. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy (SP 1996), pp. 1081–6011/96 (1996)

    Google Scholar 

  8. Conrad, M.: Nonrepudiation mechanisms for Peer-to-Peer networks. ACM portal (2006)

    Google Scholar 

  9. Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: A comprehensive overview. Elsevier Computer Networks 53, 2022–2037 (2009)

    Article  MATH  Google Scholar 

  10. Alzaid, H., Foo, E., Nieto, J.G.: Secure Data Aggregation in Wireless Sensor Network: a survey. In: Proc. 6th Australasian Information Security Conference (AISC 2008), Wollongong, Australia. CRPIT, vol. 81 (2008)

    Google Scholar 

  11. Bayya, A.K., Gupte, S., Shukla, Y.K., Garikapati, A.: Security in Ad-hoc Networks

    Google Scholar 

  12. Huang, S.-I., Shieh, S., Tygar, J.D.: Secure encrypted-data aggregation for wireless sensor networks. Springer Science+Business Media, LLC 2009, Wireless Netw. (2010) 16, 915–927 (2009)

    Google Scholar 

  13. Sang, Y., Shen, H.: Secure Data Aggregation in Wireless Sen sor Networks: A Survey. In: IEEE Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006, pp. 0-7695-2736-1/06 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tandel, P., Valiveti, S., Agrawal, K.P., Kotecha, K. (2010). Non-Repudiation in Ad Hoc Networks. In: Kim, Th., Vasilakos, T., Sakurai, K., Xiao, Y., Zhao, G., Ślęzak, D. (eds) Communication and Networking. FGCN 2010. Communications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17604-3_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17604-3_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17603-6

  • Online ISBN: 978-3-642-17604-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics