A non-repudiation scheme for user postings based on BAC in Mesh networks

It is not easy to supervise and manage nonstandard and illegal network operations in open wireless environment with multi-hop relay transmission in Mesh networks. To solve the non-repudiation issue on a user's posting operation when accessing the Internet via a wireless Mesh network, a novel non-repudiation scheme for a user's posting operation is proposed based on the user Behavior Authentication Code (BAC). By using of user's BAC, the protocol stack and authentication frame in the MAC layer of a Mesh network are reconstructed and improved so as to process the data flow conveniently in the multi-gateway mode, which ensure the secure aim of a posting operation's controllability and detectability. Simulation experiment results show the validity and feasibility of the scheme proposed.

[1]  Raphael C.-W. Phan Non-repudiable authentication and billing architecture for wireless mesh networks , 2011, Wirel. Networks.

[2]  Burkhard Stiller,et al.  AURIC: A Scalable and Highly Reusable SLA Compliance Auditing Framework , 2007, DSOM.

[3]  Luo Junzhou,et al.  On timeliness of a fair non-repudiation protocol , 2004, InfoSecu '04.

[4]  Jithra Adikari,et al.  Efficient Non-Repudiation for Techno-Information Environment , 2006, First International Conference on Industrial and Information Systems.

[5]  Purvi Tandel,et al.  Non-Repudiation in Ad Hoc Networks , 2010, FGIT-FGCN.

[6]  Li,et al.  A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains , 2010 .

[7]  Arati Baliga,et al.  An identity-based security framework For VANETs , 2006, VANET '06.

[8]  Sasan Adibi,et al.  An application layer non-repudiation wireless system: A cross-layer approach , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[9]  M. Chatterjee,et al.  Implementation of message layer protocol with non-repudiation , 2010, ICWET.

[10]  Yuguang Fang,et al.  A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[11]  Jian Ren Privacy-Preserving Communication Algorithms and Network Protocols , 2008, WASA.

[12]  Hossam Afifi,et al.  A Framework Using IBC Achieving Non-Repudiation and Privacy in Vehicular Network , 2011, 2011 Conference on Network and Information Systems Security.