Skip to main content

Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol


Securing the mobile agents from malicious code execution is the next phase of mobile network computing. Malicious code execution is one of the serious attacks in mobile agent network. To restrict the attack to an extent, a strong authentication protocol should be developed to secure from agent attacks. In this paper, an efficient encryption protocol is developed to restrict the execution of malicious code in mobile agents. The integrated bloom filter (IBF) is proposed in this work to filter the agent code and break the code into byte array blocks and generates the initial keys. For an efficient encryption and decryption, a robust and flexible key is needed, the elliptic curve is defined in this paper to generate the private and public key for the encryption process. The Ciphertext Policy Attribute-Based Encryption (CPABE) is a public key encryption method deduced to encrypt the information in the form of ciphertext associated with attributes. The implementation of proposed work is executed in the JADE platform and results are evaluated and compared with existing protocols such as Fragmentation and AES. Thus the proposed IBF-CPABE protocol is an efficient method for offering optimal security in mobile agents from various attacks and malicious code execution.

This is a preview of subscription content, access via your institution.

Fig. 1
Fig. 2

Modified hash function

Fig. 3
Fig. 4
Fig. 5
Fig. 6


  1. 1.

    Heydari, M., Sadough, S. M. S., Farash, M. S., Chaudhry, S. A., & Mahmood, K. (2016). An efficient password-based authenticated key exchange protocol with provable security for mobile client–client networks. Wireless Personal Communications, 88(2), 337–356.

    Article  Google Scholar 

  2. 2.

    Roman, R., Lopez, J., & Mambo, M. (2016). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698.

    Article  Google Scholar 

  3. 3.

    Patel, A., Alhussian, H., Pedersen, J. M., Bounabat, B., Júnior, J. C., & Katsikas, S. (2017). A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems. Computers and Security, 64, 92–109.

    Article  Google Scholar 

  4. 4.

    Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., et al. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98–120.

    Article  Google Scholar 

  5. 5.

    Kwon, H., Kim, D., Hahn, C., & Hur, J. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools and Applications, 76(19), 1–15.

    Google Scholar 

  6. 6.

    Kollati, V. K. (2017). IBFWA: Integrated bloom filter in watchdog algorithm for hybrid black hole attack detection in MANET. Information Security Journal: A Global Perspective, 26(1), 49–60.

    Google Scholar 

  7. 7.

    Phuong, T. V. X., Yang, G., & Susilo, W. (2016). Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Transactions on Information Forensics and Security, 11(1), 35–45.

    Article  Google Scholar 

  8. 8.

    Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265–1277.

    Article  Google Scholar 

  9. 9.

    Choo, K. K. R., Domingo-Ferrer, J., & Zhang, L. (2016). Cloud cryptography: Theory, practice and future research directions. Future Generation Computing Systems, 62, 51–53.

    Article  Google Scholar 

  10. 10.

    Jiang, R., Lu, R., & Choo, K. K. R. (2016). Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Generation Computer Systems, 78, 392–401.

    Article  Google Scholar 

  11. 11.

    Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115.

    Article  Google Scholar 

  12. 12.

    Zhang, Y., Kumar, N., Chen, J., & Rodrigues, J. J. (2016). A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Security and Communication Networks, 9(17), 3944–3951.

    Article  Google Scholar 

  13. 13.

    Xu, X., Zhou, J., Wang, X., & Zhang, Y. (2016). Multi-authority proxy re-encryption based on CPABE for cloud storage systems. Journal of Systems Engineering and Electronics, 27(1), 211–223.

    Google Scholar 

  14. 14.

    Shehada, D., Yeun, C.Y., Zemerly, M.J., Al Qutayri, M., Al Hammadi, Y., Damiani, E. & Hu, J. (2017). BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications. Security and Communication Networks.

  15. 15.

    Jin, J., & Ahn, S. (2016). A multipath routing protocol based on bloom filter for multihop wireless networks. Mobile Information Systems.

    Google Scholar 

  16. 16.

    Audithan, S., Murunya, T. S., & Vijayakumar, P. (2016). Anonymous authentication for secure mobile agent based internet business. Circuits and Systems, 7(08), 1421.

    Article  Google Scholar 

  17. 17.

    Kim, D., Jung, S., Hwang, D. J., & Kim, S. (2016). Mobile-based dos attack security agent in sensor networking. Wireless Personal Communications, 86(1), 91–107.

    Article  Google Scholar 

  18. 18.

    Gavalas, D., Venetis, I. E., Konstantopoulos, C., & Pantziou, G. (2017). Mobile agent itinerary planning for WSN data fusion: considering multiple sinks and heterogeneous networks. International Journal of Communication Systems, 30(8), e3184.

    Article  Google Scholar 

  19. 19.

    Vijayalakshmi, A., & Palanivelu, T. G. (2016). Enhanced security for wireless sensor networks using smart mobile agents. Indian Journal of Science and Technology, 9(35), 1–5.

    Article  Google Scholar 

  20. 20.

    Oyediran, M.O., Fagbola, T.M., Olabiyisi, S.O., Omidiora, E.O. & OMember, F.A. (2016). A survey on migration process of mobile agent. In Proceedings of the world congress on engineering and computer science (Vol. 1).

  21. 21.

    Ying, Z., Li, H., Ma, J., Zhang, J., & Cui, J. (2016). Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Science China Information Sciences, 59(4), 042701.

    Article  Google Scholar 

  22. 22.

    Liu, L., Lai, J., Deng, R. H., & Li, Y. (2016). Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Security and Communication Networks, 9(18), 4897–4913.

    Article  Google Scholar 

  23. 23.

    Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2016). A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research, 16(1), 113–139.

    Article  Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Prabhjot Kaur Jolly.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Jolly, P.K., Batra, S. Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol. Wireless Pers Commun 107, 1155–1169 (2019).

Download citation


  • Mobile agent
  • Encryption
  • Security
  • Integrated bloom filter
  • Fragmentation
  • AES
  • JADE
  • Elliptic curve
  • Java