Non-repudiation in Ad Hoc Networks

被引:0
|
作者
Tandel, Purvi [1 ]
Valiveti, Sharada [1 ]
Agrawal, K. P. [1 ]
Kotecha, K. [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, Gujarat, India
来源
关键词
non-repudiation; proof of reception; secure data aggregation; witness selection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conventional network non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but, in ad hoc networks due to mobility problem we can't use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satisfies non-repudiation requirements emerged by the application in a peer-to-peer network.
引用
收藏
页码:405 / 415
页数:11
相关论文
共 50 条
  • [31] Anonymous fingerprinting with direct non-repudiation
    Pfitzmann, B
    Sadeghi, AR
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 401 - 414
  • [32] A Non-repudiation Scheme for User Postings Based on BAC in Mesh Networks
    Yang, Yatao
    Stiller, Burkhard
    2012 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2012, : 1187 - 1190
  • [33] Signcryption with Non-interactive Non-repudiation
    John Malone-Lee
    Designs, Codes and Cryptography, 2005, 37 : 81 - 109
  • [34] On the efficient implementation of fair non-repudiation
    You, Cheng-Hwee
    Zhou, Jianying
    Lam, Kwok-Yan
    Computer Communication Review, 1998, 28 (05): : 50 - 60
  • [35] Signcryption with non-interactive non-repudiation
    Malone-Lee, J
    DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 81 - 109
  • [36] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
  • [37] A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
    蒋晓宁
    叶澄清
    Journal of Zhejiang University Science, 2000, (03) : 80 - 84
  • [38] Formal analysis of a non-repudiation protocol
    Schneider, S
    11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65
  • [39] A formal treatment of non-repudiation protocols
    Hada, S
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (02) : 461 - 470
  • [40] A proof of non-repudiation - (Transcript of discussion)
    Paulson, L
    SECURITY PROTOCOLS, 2002, 2467 : 126 - 133