Protecting Mobile Agent Loops

  • J. Cucurull
  • J. Ametller
  • J. A. Ortega-Ruiz
  • S. Robles
  • J. Borrell
Conference paper

DOI: 10.1007/11569510_8

Volume 3744 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Cucurull J., Ametller J., Ortega-Ruiz J.A., Robles S., Borrell J. (2005) Protecting Mobile Agent Loops. In: Magedanz T., Karmouch A., Pierre S., Venieris I. (eds) Mobility Aware Technologies and Applications. MATA 2005. Lecture Notes in Computer Science, vol 3744. Springer, Berlin, Heidelberg

Abstract

A mobile agent’s itinerary describes the set of hosts visited during the agent’s travel, and must be protected against malicious entities trying to access and/or modify it for their own benefit. Protection mechanisms must be put in place, but we should avoid imposing unnecessary limitations on the agent’s ability to choose its itinerary in an as flexible as possible way. In this article, we extend previous work on itinerary protection protocols to include loops among the allowable protected itineraries for roaming agents. Our agents can thus traverse a whole new range of paths in a secure way.

Keywords

Mobile Agents Security Itinerary Protection Loops 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • J. Cucurull
    • 1
  • J. Ametller
    • 1
  • J. A. Ortega-Ruiz
    • 1
  • S. Robles
    • 1
  • J. Borrell
    • 1
  1. 1.Department of Information and Communications EngineeringAutonomous University of BarcelonaBellaterraSpain