Secure mobile agents with controlled resources
β Scribed by Qi Zhang; Yi Mu; Minjie Zhang; Robert H. Deng
- Publisher
- John Wiley and Sons
- Year
- 2010
- Tongue
- English
- Weight
- 195 KB
- Volume
- 23
- Category
- Article
- ISSN
- 1532-0626
- DOI
- 10.1002/cpe.1618
No coin nor oath required. For personal study only.
β¦ Synopsis
Abstract
Mobile agents often travel in a hostile environment where their security and privacy could be compromised by any party including remote hosts in which agents visit and get services. It is believed that the host visited by an agent should jointly sign a service agreement with the agent's owner; hence a proxyβsigning model was proposed in the literature, allowing every host in the agent system to sign a service agreement. We observe that this actually poses a serious problem whereby a host that should be excluded from an underlying agent network could also send a signed service agreement. In order to solve this problem, we propose two schemes achieving host authentication with controlled resources, where only selected hosts can be included in the agent network. We provide two schemes in this paper. The second scheme offers a smaller data size. We also define security models and provide rigorous security proofs to our schemes. Copyright Β© 2010 John Wiley & Sons, Ltd.
π SIMILAR VOLUMES
Many network intrusion detection systems detect intrusions by concentrating all logs of target systems in a server and having the server subsequently analyze these logs. At the Information-technology Promotion Agency (IPA), we have been developing an alternate type of network intrusion detection sys
## Abstract Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recent