Securing the mobile agents from malicious code execution is the next phase of mobile network computing. Malicious code execution is one of the serious attacks in mobile agent network. To restrict the attack to an extent, a strong authentication protocol should be developed to secure from agent attacks. In this paper, an efficient encryption protocol is developed to restrict the execution of malicious code in mobile agents. The integrated bloom filter (IBF) is proposed in this work to filter the agent code and break the code into byte array blocks and generates the initial keys. For an efficient encryption and decryption, a robust and flexible key is needed, the elliptic curve is defined in this paper to generate the private and public key for the encryption process. The Ciphertext Policy Attribute-Based Encryption (CPABE) is a public key encryption method deduced to encrypt the information in the form of ciphertext associated with attributes. The implementation of proposed work is executed in the JADE platform and results are evaluated and compared with existing protocols such as Fragmentation and AES. Thus the proposed IBF-CPABE protocol is an efficient method for offering optimal security in mobile agents from various attacks and malicious code execution.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
Heydari, M., Sadough, S. M. S., Farash, M. S., Chaudhry, S. A., & Mahmood, K. (2016). An efficient password-based authenticated key exchange protocol with provable security for mobile client–client networks. Wireless Personal Communications, 88(2), 337–356.
Roman, R., Lopez, J., & Mambo, M. (2016). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698.
Patel, A., Alhussian, H., Pedersen, J. M., Bounabat, B., Júnior, J. C., & Katsikas, S. (2017). A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems. Computers and Security, 64, 92–109.
Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., et al. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98–120.
Kwon, H., Kim, D., Hahn, C., & Hur, J. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools and Applications, 76(19), 1–15.
Kollati, V. K. (2017). IBFWA: Integrated bloom filter in watchdog algorithm for hybrid black hole attack detection in MANET. Information Security Journal: A Global Perspective, 26(1), 49–60.
Phuong, T. V. X., Yang, G., & Susilo, W. (2016). Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Transactions on Information Forensics and Security, 11(1), 35–45.
Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265–1277.
Choo, K. K. R., Domingo-Ferrer, J., & Zhang, L. (2016). Cloud cryptography: Theory, practice and future research directions. Future Generation Computing Systems, 62, 51–53.
Jiang, R., Lu, R., & Choo, K. K. R. (2016). Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Generation Computer Systems, 78, 392–401.
Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115.
Zhang, Y., Kumar, N., Chen, J., & Rodrigues, J. J. (2016). A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Security and Communication Networks, 9(17), 3944–3951.
Xu, X., Zhou, J., Wang, X., & Zhang, Y. (2016). Multi-authority proxy re-encryption based on CPABE for cloud storage systems. Journal of Systems Engineering and Electronics, 27(1), 211–223.
Shehada, D., Yeun, C.Y., Zemerly, M.J., Al Qutayri, M., Al Hammadi, Y., Damiani, E. & Hu, J. (2017). BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications. Security and Communication Networks.
Jin, J., & Ahn, S. (2016). A multipath routing protocol based on bloom filter for multihop wireless networks. Mobile Information Systems. https://doi.org/10.1155/2016/8151403.
Audithan, S., Murunya, T. S., & Vijayakumar, P. (2016). Anonymous authentication for secure mobile agent based internet business. Circuits and Systems, 7(08), 1421.
Kim, D., Jung, S., Hwang, D. J., & Kim, S. (2016). Mobile-based dos attack security agent in sensor networking. Wireless Personal Communications, 86(1), 91–107.
Gavalas, D., Venetis, I. E., Konstantopoulos, C., & Pantziou, G. (2017). Mobile agent itinerary planning for WSN data fusion: considering multiple sinks and heterogeneous networks. International Journal of Communication Systems, 30(8), e3184.
Vijayalakshmi, A., & Palanivelu, T. G. (2016). Enhanced security for wireless sensor networks using smart mobile agents. Indian Journal of Science and Technology, 9(35), 1–5.
Oyediran, M.O., Fagbola, T.M., Olabiyisi, S.O., Omidiora, E.O. & OMember, F.A. (2016). A survey on migration process of mobile agent. In Proceedings of the world congress on engineering and computer science (Vol. 1).
Ying, Z., Li, H., Ma, J., Zhang, J., & Cui, J. (2016). Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Science China Information Sciences, 59(4), 042701.
Liu, L., Lai, J., Deng, R. H., & Li, Y. (2016). Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Security and Communication Networks, 9(18), 4897–4913.
Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2016). A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research, 16(1), 113–139.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Jolly, P.K., Batra, S. Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol. Wireless Pers Commun 107, 1155–1169 (2019). https://doi.org/10.1007/s11277-019-06329-7
- Mobile agent
- Integrated bloom filter
- Elliptic curve