Non-repudiation in Ad Hoc Networks

被引:0
|
作者
Tandel, Purvi [1 ]
Valiveti, Sharada [1 ]
Agrawal, K. P. [1 ]
Kotecha, K. [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, Gujarat, India
来源
关键词
non-repudiation; proof of reception; secure data aggregation; witness selection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conventional network non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but, in ad hoc networks due to mobility problem we can't use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satisfies non-repudiation requirements emerged by the application in a peer-to-peer network.
引用
收藏
页码:405 / 415
页数:11
相关论文
共 50 条
  • [1] A secure mutual authentication scheme with non-repudiation for vehicular ad hoc networks
    Chen, Chin-Ling
    Chiang, Mao-Lun
    Peng, Chun-Cheng
    Chang, Chun-Hsin
    Sui, Qing-Ru
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [2] Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks
    Lv, Xixiang
    Li, Hui
    IET INFORMATION SECURITY, 2013, 7 (02) : 61 - 66
  • [3] Verifiable agreement: Limits of non-repudiation in mobile peer-to-peer ad hoc networks
    Benenson, Zinaida
    Freiling, Felix C.
    Pfitzmann, Birgit
    Rohner, Christian
    Waidner, Michael
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2006, 4357 : 165 - +
  • [4] An ID-based framework achieving privacy and non-repudiation in vehicular ad hoc networks
    Sun, Jinyuan
    Zhang, Chi
    Fang, Yuguang
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2478 - 2484
  • [5] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [6] A proof of non-repudiation
    Bella, G
    Paulson, LC
    SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [7] Evidence and non-repudiation
    National University, Singapore, Singapore
    不详
    J Network Comput Appl, 3 (267-281):
  • [8] Observations on non-repudiation
    Lect Notes Comput Sci, (133):
  • [9] An efficient non-repudiation protocol
    Zhou, JY
    Gollmann, D
    10TH COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1997, : 126 - 132
  • [10] A fair non-repudiation protocol
    Meng, B
    Wang, SM
    Xiong, QX
    PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON CSCW IN DESIGN, 2002, : 68 - 73