DocumentCode
1628163
Title
Securing continuous auditing in wireless network
Author
Zhang, Juan ; Wan, Changsheng
Author_Institution
Accounting department, Nanjing university, Nanjing, Jiangsu, China
fYear
2011
Firstpage
1
Lastpage
4
Abstract
This paper proposes a security scheme for continuous auditing agent architecture. Current continuous auditing agent architecture does not take security into consideration. This makes it vulnerable to a variety of attacks. This paper proposes an elliptic curve based authentication scheme that can authenticate the data source and the continuous auditing agent. After authentication, a shared key is established between the data source and the continuous auditing agent. Therefore the auditing data is protected by that shared key.
Keywords
Authentication; Computer architecture; Elliptic curves; Protocols; Public key; Wireless networks; continuous auditing; continuous auditing agent; continuous auditing center; data source; elliptic curve;
fLanguage
English
Publisher
ieee
Conference_Titel
E -Business and E -Government (ICEE), 2011 International Conference on
Conference_Location
Shanghai, China
Print_ISBN
978-1-4244-8691-5
Type
conf
DOI
10.1109/ICEBEG.2011.5881375
Filename
5881375
Link To Document