Property-Based Taming of Lying Mobile Nodes

  • Authors:
  • Mark Manulis;Ahmad-Reza Sadeghi

  • Affiliations:
  • Ruhr-University of Bochum, Germany;Ruhr-University of Bochum, Germany

  • Venue:
  • AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Intelligent security protocols can verify whether the involved principals have properties that are defined based on certain functional and security policies. The property we focus on is the performance of mobile devices participating in a security protocol. In this context, the protocol should distribute the computation, communication and storage costs fairly among all devices. However, the protocol should foresee against cheating participants who may lie about their properties to gain advantage.