Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/2466
Title: Non-repudiation in Ad Hoc Networks
Authors: Purvi H., Tandel
Keywords: Computer 2009
Project Report 2009
Computer Project Report
Project Report
09MCE
09MCE027
Issue Date: 1-Jun-2011
Publisher: Institute of Technology
Series/Report no.: 09MCE027
Abstract: With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conven- tional networks, non-repudiation is achieved using protocols involving TTP. Non- repudiation in conventional networks is achieved using di erent protocols, but in ad hoc networks due to mobility problem it is infeasible to use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satis es non-repudiation requirements emerged by the application in a peer-to-peer network. In ad hoc network, non-repudiation can be achieved using two main methods : wit- ness selection and proof of reception. Witness set selection can be done by setting transmission range in the topology and transmitting the data over the network. Some nodes will route packets for another node working as intermediate node. Node with number of packets routed for another node with higher probability can be an efficient intermediate node between the source and the destination nodes. Another approach to nd witness node from the witness set is using data aggregation method. Witness node will work as TTP in the network and by using proof of reception method, source and destination node will transmit secure data. Non-repudiation is a way to guaran- tee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message. Due to infrastructure-less and self-organized characteristics, ad hoc network encounters di erent problems from infrastructure-based wired network, such as key management, power shortage, and security issues. Proof of reception is a key element for providing secure contract con- clusion between members on a market place. According to nature of ad-hoc network, some requirements like data integrity, data con dentiality, non-repudiation of content for sender, non-repudiation of reception for recipient need to be taken care of. Same way attacks like denial by sender, denial by receiver, brute force attack and witness selection are the factors a ecting non-repudiation in ad-hoc networks.
URI: http://hdl.handle.net/123456789/2466
Appears in Collections:Dissertation, CE

Files in This Item:
File Description SizeFormat 
09MCE027.pdf09MCE027895.06 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.