Non-repudiation in Ad Hoc Networks

被引:0
|
作者
Tandel, Purvi [1 ]
Valiveti, Sharada [1 ]
Agrawal, K. P. [1 ]
Kotecha, K. [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, Gujarat, India
来源
关键词
non-repudiation; proof of reception; secure data aggregation; witness selection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conventional network non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but, in ad hoc networks due to mobility problem we can't use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satisfies non-repudiation requirements emerged by the application in a peer-to-peer network.
引用
收藏
页码:405 / 415
页数:11
相关论文
共 50 条
  • [21] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [22] Non-repudiation and the metaphysics of presence
    Roe, Michael
    SECURITY PROTOCOLS, 2007, 4631 : 207 - 214
  • [23] A key authentication scheme with non-repudiation
    Hwang, Min-Shiang
    Li, Li-Hua
    Lee, Cheng-Chi
    Operating Systems Review (ACM), 2004, 38 (03): : 75 - 78
  • [24] Non-repudiation in SET: Open issues
    Van Herreweghen, E
    FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 140 - 156
  • [25] A mutual non-repudiation protocol with privacy
    Jiang Xiao-ning
    Ye Cheng-qing
    Journal of Zhejiang University-SCIENCE A, 2000, 1 (3): : 317 - 321
  • [26] Securing digital signatures for non-repudiation
    Zhou, J
    Lam, KY
    COMPUTER COMMUNICATIONS, 1999, 22 (08) : 710 - 716
  • [27] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [28] Non-repudiation protocols for multiple entities
    Onieva, JA
    Zhou, JY
    Lopez, J
    COMPUTER COMMUNICATIONS, 2004, 27 (16) : 1608 - 1616
  • [29] Some guidelines for non-repudiation protocols
    Louridas, P
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2000, 30 (05) : 29 - 38
  • [30] Non-repudiation with mandatory proof of receipt
    Coffey, Tom
    Saidha, Puneet
    Computer Communication Review, 1996, 26 (01): : 6 - 17