𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Secure mobile agents with controlled resources

✍ Scribed by Qi Zhang; Yi Mu; Minjie Zhang; Robert H. Deng


Publisher
John Wiley and Sons
Year
2010
Tongue
English
Weight
195 KB
Volume
23
Category
Article
ISSN
1532-0626

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract

Mobile agents often travel in a hostile environment where their security and privacy could be compromised by any party including remote hosts in which agents visit and get services. It is believed that the host visited by an agent should jointly sign a service agreement with the agent's owner; hence a proxy‐signing model was proposed in the literature, allowing every host in the agent system to sign a service agreement. We observe that this actually poses a serious problem whereby a host that should be excluded from an underlying agent network could also send a signed service agreement. In order to solve this problem, we propose two schemes achieving host authentication with controlled resources, where only selected hosts can be included in the agent network. We provide two schemes in this paper. The second scheme offers a smaller data size. We also define security models and provide rigorous security proofs to our schemes. Copyright Β© 2010 John Wiley & Sons, Ltd.


πŸ“œ SIMILAR VOLUMES


Information gathering with mobile agents
✍ Midori Asaka πŸ“‚ Article πŸ“… 1999 πŸ› John Wiley and Sons 🌐 English βš– 330 KB πŸ‘ 2 views

Many network intrusion detection systems detect intrusions by concentrating all logs of target systems in a server and having the server subsequently analyze these logs. At the Information-technology Promotion Agency (IPA), we have been developing an alternate type of network intrusion detection sys

Lightweight and provably secure user aut
✍ Chun Chen; Daojing He; Sammy Chan; Jiajun Bu; Yi Gao; Rong Fan πŸ“‚ Article πŸ“… 2011 πŸ› John Wiley and Sons 🌐 English βš– 457 KB

## Abstract Seamless roaming in the global mobility network (GLOMONET) is highly desirable for mobile users, although their proper authentication is challenging. This is because not only are wireless networks susceptible to attacks, but also mobile terminals have limited computational power. Recent