Skip to main content

Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks

  • Conference paper
Book cover Security and Privacy in Ad-Hoc and Sensor Networks (ESAS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4357))

Included in the following conference series:

  • 553 Accesses

Abstract

We introduce verifiable agreement as a fundamental service for securing mobile peer-to-peer ad hoc networks, and investigate its solvability. Verifiability of a protocol result means that the participants can prove that the protocol reached a particular result to any third party (the verifier) which was not present in the network at the time of the protocol execution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aboudagga, N., Refaei, M.T., Eltoweissy, M., DaSilva, L.A., Quisquater, J.-J.: Authentication protocols for ad hoc networks: taxonomy and research issues. In: Q2SWinet 2005: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 96–104. ACM Press, New York (2005)

    Chapter  Google Scholar 

  2. Asokan, N., Baum-Waidner, B., Schunter, M., Waidner, M.: Optimistic synchronous multi-party contract signing. Technical Report Research Report RZ 3089, IBM Zurich Research Laboratory (1998)

    Google Scholar 

  3. Asokan, N., Ginzboorg, P.: Key-agreement in ad-hoc networks. Computer Communications 23(17), 1627–1637 (2000)

    Article  Google Scholar 

  4. Augot, D., Bhaskar, R., Issarny, V., Sacchetti, D.: An efficient group key agreement protocol for ad hoc networks. In: First International IEEE WoWMoM Workshop on Trust, Security and Privacy for Ubiquitous Computing (2005)

    Google Scholar 

  5. Baum-Waidner, B., Waidner, M.: Round-optimal and abuse-free multi-party contract signing. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Ben-Or, M., Goldreich, O., Micali, S., Rivest, R.L.: A fair protocol for signing contracts. IEEE Transactions on Information Theory 36(1) (1990)

    Google Scholar 

  7. Blum, M.: Three applications of the oblivious transfer. Technical report, Department of EECS, University of California, Berkeley, CA (1981)

    Google Scholar 

  8. Bracha, G., Toueg, S.: Asynchronous consensus and broadcast protocols. J. ACM 32(4) (1985)

    Google Scholar 

  9. Fischer, M.J.: The consensus problem in unreliable distributed systems (a brief survey). In: Proceedings of the 1983 International FCT-Conference on Fundamentals of Computation Theory, London, UK, pp. 127–140. Springer, Heidelberg (1983)

    Google Scholar 

  10. Fitzi, M., Garay, J.A.: Efficient player-optimal protocols for strong and differential consensus. In: PODC 2003: Proceedings of the twenty-second annual symposium on Principles of distributed computing, pp. 211–220. ACM Press, New York (2003)

    Chapter  Google Scholar 

  11. Garay, J.A., MacKenzie, P.D.: Abuse-free multi-party contract signing. In: Proceedings of the 13th International Symposium on Distributed Computing, London, UK, pp. 151–165. Springer, Heidelberg (1999)

    Google Scholar 

  12. Goldwasser, S.: Multi party computations: past and present. In: PODC 1997: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, pp. 1–6. ACM Press, New York (1997)

    Chapter  Google Scholar 

  13. Hirt, M., Maurer, U.: Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In: PODC 1997: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, pp. 25–34. ACM Press, New York (1997)

    Chapter  Google Scholar 

  14. Hubaux, J.-P., Buttyan, L., Capkun, S.: The quest for security in mobile ad hoc networks. In: MobiHoc 2001: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 146–155. ACM Press, New York (2001)

    Chapter  Google Scholar 

  15. Kursawe, K.: Distributed Trust. PhD thesis, Department of Computer Science, Saarland University (2001)

    Google Scholar 

  16. Lamport, L.: The weak byzantine generals problem. J. ACM 30(3), 668–676 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  17. Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)

    Article  MATH  Google Scholar 

  18. Liu, J., Sacchetti, D., Sailhan, F., Issarny, V.: Group management for mobile ad hoc networks: design, implementation and experiment. In: MDM 2005: Proceedings of the 6th international conference on Mobile data management, pp. 192–199. ACM Press, New York (2005)

    Chapter  Google Scholar 

  19. Luo, J., Eugster, P.T., Hubaux, J.-P.: Pilot: Probabilistic lightweight group communication system for ad hoc networks. IEEE Transactions on Mobile Computing 3(2), 164–179 (2004)

    Article  Google Scholar 

  20. Pease, M., Shostak, R., Lamport, L.: Reaching agreement in presense of faults. Journal of the ACM 27(2), 228–234 (1980)

    Article  MATH  MathSciNet  Google Scholar 

  21. Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. Parallel Distrib. Syst. 11(8), 769–780 (2000)

    Article  Google Scholar 

  22. Tang, L.: Verifiable transaction atomicity for electronic payment protocols. In: ICDCS 1996: Proceedings of the 16th International Conference on Distributed Computing Systems (ICDCS 1996), IEEE Computer Society, Washington (1996)

    Google Scholar 

  23. Zhou, J., Onieva, J., Lopez, J.: A synchronous multi-party contract signing protocol improving lower bound of steps. In: SEC 2006: 21st IFIP International Information Security Conference (May 2006)

    Google Scholar 

  24. Zhou, L., Haas, Z.J.: Securing ad hoc networks. IEEE Network 13(6), 24–30 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Benenson, Z., Freiling, F.C., Pfitzmann, B., Rohner, C., Waidner, M. (2006). Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks. In: Buttyán, L., Gligor, V.D., Westhoff, D. (eds) Security and Privacy in Ad-Hoc and Sensor Networks. ESAS 2006. Lecture Notes in Computer Science, vol 4357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11964254_15

Download citation

  • DOI: https://doi.org/10.1007/11964254_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69172-3

  • Online ISBN: 978-3-540-69173-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics