Loading...
Please wait, while we are loading the content...
Similar Documents
Enhanced Security through Agent Based Non-Repudiation Protocol for Mobile Agents
| Content Provider | Semantic Scholar |
|---|---|
| Author | Sharmila, Ceronmani Komalavalli Salai, Rajiv Gandhi |
| Copyright Year | 2012 |
| Abstract | In mobile communication, the key factor that affects the performance of a good security protocol is the timeliness of the security components of the transactions. Even though, there are mathematically well-established rigid security algorithms and implementation mechanisms available in the market, it is very difficult to predict the events in a mobile communication mechanism. This timeliness of the information exchange between two mobile nodes involved in any mobile wireless communication has led to various attempts to innovate good rigid security mechanisms that shall also take care of the time domain factors. Non repudiation protocols are designed in such a way that two agents were involved in transactions shall never be able to repudiate and deny the involvement at a later point of time. In this work, a non-repudiation agent based approach for resolving any conflicts in security protocols is being proposed. An evidence of a transaction is generated by wireless PKI mechanism such that User and Rights Issuer cannot repudiate sending and receiving the message respectively. User generates a mobile agent, which carries encrypted payment information to RI. The user also issues this mobile agent a proxy certificate; this certificate guarantees the binding relationship between them. One trusted third party acts as a lightweight notary for evidence generation. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.ijcns.com/pdf/ijpcsc8.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |