Non-repudiation in Ad Hoc Networks

被引:0
|
作者
Tandel, Purvi [1 ]
Valiveti, Sharada [1 ]
Agrawal, K. P. [1 ]
Kotecha, K. [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, Gujarat, India
来源
关键词
non-repudiation; proof of reception; secure data aggregation; witness selection;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. In conventional network non-repudiation is achieved using protocols involving TTP. Non-repudiation in conventional network is achieved using different protocols, but, in ad hoc networks due to mobility problem we can't use trusted third party (TTP). There is a scope to implement a non-repudiation protocol, which satisfies non-repudiation requirements emerged by the application in a peer-to-peer network.
引用
收藏
页码:405 / 415
页数:11
相关论文
共 50 条
  • [41] On the security of fair non-repudiation protocols
    Gürgens, S
    Rudolph, C
    Vogt, H
    INFORMATION SECURITY, PROCEEDINGS, 2003, 2851 : 193 - 207
  • [42] A formal analysis of CORBA non-repudiation
    Zheng, H
    Song, GX
    International Conference on Computing, Communications and Control Technologies, Vol 6, Post-Conference Issue, Proceedings, 2004, : 401 - 405
  • [43] An email system with non-repudiation service
    Natural Science Academic Publishing Center of Higher Education Press, Beijing 100029, China
    J. China Univ. Post Telecom., 2007, SUPPL. 1 (124-130):
  • [44] On the security of fair non-repudiation protocols
    Gürgens S.
    Rudolph C.
    Vogt H.
    International Journal of Information Security, 2005, 4 (4) : 253 - 262
  • [45] Evolution of fair non-repudiation with TTP
    Zhou, JY
    Deng, R
    Bao, F
    INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 258 - 269
  • [46] Improvement of a fair non-repudiation protocol
    Wen, Jinghua
    Liang, Min
    Yang, Zirong
    Li, Xiang
    PROCEEDINGS OF E-ENGDET2006, 2006, : 70 - 74
  • [48] Towards verification of timed non-repudiation protocols
    Wei, K
    Heather, J
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 244 - 257
  • [49] Automated Design of Non-repudiation Security Protocols
    Xue, Haifeng
    Zhang, Huanguo
    Qing, Sihan
    Yu, Rongwei
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2318 - +
  • [50] Solution for Non-Repudiation in GSM WAP Applications
    Toma, Cristian
    Popa, Marius
    Boja, Catalin
    SEPADS 08: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PARALLEL AND DISTRIBUTED SYSTEMS, 2008, : 212 - 219