1
Approaching decentralized non-repudiation
H. Kamdem Fezeu
1,
*, T. Djotio
2
and R. Oulad Haj Thami
3
1
University of Yaounde I, harry.kamdem@polytechnique.cm
2
University of Yaounde I, tdjotio@gmail.com
3
Mohammed V University, rachid.ouladhajthami@gmail.com
Abstract
Securing data exchanges is a major preoccupation, and several techniques have been developed to reach that aim. The
predominant model for such exchange is that which relies on trusted third-parties. Meanwhile, emerging technologies such
as IoT are set to broadcast growing amounts of sensitive data, thereby making centralized architectures problematic for
privacy and performance reasons and making decentralized networks ever more relevant. However, these third-parties play
an important role in securing brokered communications and are essential in providing Authentication and Non-Repudiation
according to current models, and cannot be used in peer-to-peer networks. Hence there is need for a simple model applicable
in fully decentralized networks to provide Non-Repudiation. This document proposes such a model, presents an
implementation and discusses its application, particularly in implementing irrefutable trustless transaction mechanisms –
similar to blockchain – with limited resources.
Keywords: Information Security, Internet of Things, Mesh Networks, Blockchain
Received on 15 December 2017, accepted on 5 January, 2018, published on 12 January 2018
Copyright © 2018 Author et al., licensed to EAI. This is an open access article distributed under the terms of the Creative
Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and
reproduction in any medium so long as the original work is properly cited.
doi: 10.4108/eai.12-1-2018.153559
1. Introduction
The basic requirements of Information Security, are
generally referred to as the “CIA triad” [1], comprising
Confidentiality (ensuring that information is not disclosed
to non-authorized third-parties), Integrity (ensuring that
information is not altered during transit) and Availability
(ensuring that information reaches the correct recipients).
Several cryptographic techniques have been adapted to
autonomous distributed networks and as such, the basic
tenets of the “CIA triad” can successfully be fulfilled in a
Mesh Network. Nonetheless, there exists a number of
issues which re-quire different forms of security such as
Authentication and Non-repudiation which are not
generally addressed.
On the internet, the implementation of such
characteristics generally involves the introduction of a
Trusted Third-Party allowing for brokered communication,
typically in a client-server model. Such an entity serves as
middle-man or notary, and may leverage other
*
Corresponding author. Email:kamdemharry@gmail.com
technologies to further secure communications (SSL, PGP,
etc.). However, in a peer-to-peer net-work, such a solution
would be impractical as any node may leave the network at
any moment and no node is to be inherently trusted.
This paper presents a cryptographic approach to
securing communications, which allows for Non-
repudiation and Authentication in addition to
Confidentiality, Integrity and Availability, and which can
readily be implemented in decentralized networks, as well
as overlaid on existing infrastructure. It starts out with a
brief overview of the existing literature, and then presents
the proposed communication model, before discussing the
principle and results of an experimental implementation,
and goes on to discuss the pertinence of the said model as
an alternative to blockchain in scenarios with little
computing resources before ending with concluding
remarks.
EAI Endorsed Transactions
on Future Internet Research Article
EAI Endorsed Transactions on
Future Internet
12 2017 - 01 2018 | Volume 4 | Issue 13 | e2