Abstract
In the world of mobile agents, security aspects are extensively being discussed, with strong emphasis on how agents can be protected against malicious hosts and vice versa. This paper discusses a method for concealing an agent’s route information from being misused by sites en route to collect profile information of the agent’s owner. Furthermore, it is shown that the protected route resists attacks from a single malicious host and from colluding malicious hosts as well.
Download to read the full chapter text
Chapter PDF
References
F. Mattern: ’Mobile Agenten’, it + ti-Oldenbourg Verlag, 1998, 4, pp.12–17.
W. Ernestus, D. Ermer, M. Hube, M. Köhntopp, M. Knorr, G. Quiring-Kock, U. Schläger, G. Schulz: ’Datenschutzfreundliche Technologien’, DuD 21, 1997, 12, pp.709–715.
S. Berkovits, J. Guttman, V. Swarup: ’Authentication for Mobile Agents’, in ’Mobile Agents and Security’, Proceedings, Springer Verlag, LNCS 1419, 1998, pp.114–136.
D. Chess: ’Security Issues in Mobile Code Systems’, in ’Mobile Agents and Security’, Proceedings, Springer Verlag, LNCS 1419, 1998, pp.1–14.
D. Westhoff: ’AAPI: an Agent Application Programming Interface’, Informatikbericht 247-12/1998, FernUniversität Gesamthochschule in Hagen 1998.
G. Vigna: ’Cryptographic Traces for Mobile Agents’, in ’Mobile Agents and Security’, Proceedings, Springer Verlag, LNCS 1419, 1998, pp.138–153.
W.M. Farmer, J. Guttman, V. Swarup: ’Security for Mobile Agents: Authentication and State Appraisal’, in ’Proc. of the 4th European Symp. on Research in Computer Security’, Springer Verlag, LNCS 1146, 1996, pp.118–130.
U.G. Wilhelm: ’Cryptographically protected Objects’. Technical report, Ecole Polytechnique Federale de Lausanne, Switzerland, 1997.
T. Sander, C. Tschudin: ’Protecting Mobile Agents Against Malicious Hosts’, in ’Mobile Agents and Security’, Proceedings, Springer Verlag, LNCS 1419, 1998, pp.44–60.
F. Hohl: ’Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts’, in ’Mobile Agents and Security’, Proceedings, Springer Verlag, LNCS 1419, 1998, pp.92–113.
M.G. Reed, P.F. Syverson, D.M. Goldschlag: ‘Anonymous Connections and Onion Routing’, in ’IEEE Journal on Selected Areas in Communication-Special Issue on Copyright and Privacy Protection’, Vol. 16, No. 4, 1998, pp.482–494.
R. Rivest, A. Shamir, L. Adleman: ’A Method for Obtaining Digital Signatures and Public-Key Cryptosystems’ in ’Communication of ACM’, Volume 21, Number 2, February 1978, pp.120–126.
N. Asokan, V. Shoup, M. Waidner: ’Asynchronous Protocols for Optimistical Fair Exchange’, 1998 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos 1998, pp.86–99.
Y. Han: ’Investigation of Non-repudiation Protocols’, in ’Information Security and Privacy’, Proceedings of ACISP’96, Springer Verlag, LNCS 1172, 1996, pp.38–47.
C. Meadows: ’Detecting Attacks on Mobile Agents’, Center for High Assurance Computing Systems, Naval Research Laboratory, Washington DC, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Westhoff, D., Schneider, M., Unger, C., Kaderali, F. (2000). Protecting a Mobile Agent’s Route against Collusions. In: Heys, H., Adams, C. (eds) Selected Areas in Cryptography. SAC 1999. Lecture Notes in Computer Science, vol 1758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46513-8_16
Download citation
DOI: https://doi.org/10.1007/3-540-46513-8_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67185-5
Online ISBN: 978-3-540-46513-3
eBook Packages: Springer Book Archive