Partial Group Session Key Agreement Scheme for Mobile Agents in e-Commerce Environment

  • Hyun-jin Cho
  • Gu Su Kim
  • Young Ik Eom
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4088)


In this paper, we consider an e-Commerce system that supports buying and selling goods or services over the Internet using Mobile Agent(MA) technologies. MAs are active, autonomous, and self-replicable software objects containing both computational logic and state information. When MA technologies are applied to e-Commerce environments, the MAs can search for a product on behalf of the buyer. The buyer constructs a group of MAs, and dispatches each agent in the group to the supplier sites. Each buyer agent compares price information of goods which are suggested by the suppliers. Eventually, all MAs exchange their price information cooperating to determine the most suitable item. In the selection process, if the price information which is exchanged among the MAs is modified by malicious entities, the user may not select intended goods. In this paper, we propose a group session key generation scheme called PGKA(Partial Group session Key Agreement) for secure communication among the MAs. The PGKA has no sponsors, controllers, or any other members charged with special duties. The main idea in PGKA is to distribute the computation of the group session key generation among the members, which makes the scheme suitable for fully distributed environments. In addition, the cost of the key reconstruction is very low in this scheme, because only the seed value is required to be transmitted for the reconstruction process.


Group Session Mobile Agent Group Controller Buyer Agent Supply Agent 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aneiba, A., Rees, J.S.: Mobile Agent Technology and Mobility. In: Proc. of the 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, June 2004 (2004)Google Scholar
  2. 2.
    Lin, F.C., Kuo, C.N.: Cooperative Multi-Agent Negotiation for Electronic Commerce Based on Mobile Agents. In: Proc. of the IEEE Int’l Conf. on Systems, Man and Cybernetics, October 2002 (2002)Google Scholar
  3. 3.
    Dasgupta, P., Narasimhan, N., Moser, L.E., Melliar-Smith, P.M.: MAgNET: Mobile Agents for Networked Electronic Trading. In: Proc. of the IEEE Int’l Conf. on Transactions on Knowledge and Data Engineering, July/August 1999 (1999)Google Scholar
  4. 4.
    Jong, J.J., Geun, S.J.: Brokerage Between Buyer and Seller Agents using Constraint Satisfaction Problem Models. In: Proc. of the Decision Support Systems, June 2000, vol. 28(4), Elsevier, Amsterdam (2000)Google Scholar
  5. 5.
    Sandholm, T., Huai, Q.: Nomad: Mobile Agent System for an Internet-Based Auction House. Int’l Journal of the IEEE Internet Computing (March/April 2000)Google Scholar
  6. 6.
    Sandholm, T.W.: eMediator: A Next-Generation Electronic Commerce Server. In: Proc. of the Fourth Int’l Conf. Autonomous Agents (AGENTS), June 2000 (2000)Google Scholar
  7. 7.
    Rafaeli, S., Hutchison, D.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys (September 2003)Google Scholar
  8. 8.
    Moyer, M., Rao, J., Rohatgi, P.: A Survey of Security Issues in Multicast Communications. Int’l Journal of the IEEE Network (November/December 1999)Google Scholar
  9. 9.
    Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On the Performance of Group Key Agreement Protocols. In: Proc. of the 22nd. Int’l Conf. on Distributed Computing Systems (July 2002)Google Scholar
  10. 10.
    Stallings, W.: Cryptography and Network Security; Principles and Practice. Prentice-Hall, Englewood Cliffs (2003)Google Scholar
  11. 11.
    Rabi, M., Sherman, A.T.: Associative one-way functions: A New Paradigm for Secret-Key Agreement and Digital Signatures. Technical Report CS-TR- 3183/UMIACS-TR-93-124, Dept. of Computer Science, Univ. of Maryland, College Park, Maryland (November 1993)Google Scholar
  12. 12.
    Lee, G.Y., Lee, Y.: Efficient Rekey Interval for Minimum Cost on Secure Multicast System using Group Key. In: Proc. of the IEEE Int’l Conf. on Global Telecommunications Conf (GLOBECOM 2002), November 2002 (2002)Google Scholar
  13. 13.
    Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, Springer, Heidelberg (1994)Google Scholar
  14. 14.
    Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended to Group Communication. In: Proc. of the 3rd ACM Conf. on Computer and Communications Security, March 1996 (1996)Google Scholar
  15. 15.
    Rodeh, O., Birman, K.P., Dolev, D.: Optimized Group Rekey for Group Communication Systems. In: Proc. of the Symp. on Network and Distributed Systems Security (NDSS 2000), February 2000 (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Hyun-jin Cho
    • 1
  • Gu Su Kim
    • 1
  • Young Ik Eom
    • 1
  1. 1.School of Information and Communication Eng.Sungkyunkwan UniversitySuwonKorea

Personalised recommendations