Protecting Mobile Agent Loops
- Cite this paper as:
- Cucurull J., Ametller J., Ortega-Ruiz J.A., Robles S., Borrell J. (2005) Protecting Mobile Agent Loops. In: Magedanz T., Karmouch A., Pierre S., Venieris I. (eds) Mobility Aware Technologies and Applications. MATA 2005. Lecture Notes in Computer Science, vol 3744. Springer, Berlin, Heidelberg
A mobile agent’s itinerary describes the set of hosts visited during the agent’s travel, and must be protected against malicious entities trying to access and/or modify it for their own benefit. Protection mechanisms must be put in place, but we should avoid imposing unnecessary limitations on the agent’s ability to choose its itinerary in an as flexible as possible way. In this article, we extend previous work on itinerary protection protocols to include loops among the allowable protected itineraries for roaming agents. Our agents can thus traverse a whole new range of paths in a secure way.
KeywordsMobile Agents Security Itinerary Protection Loops
Unable to display preview. Download preview PDF.