A Novel Key Management and Access Control Scheme for Mobile Agent
The speed and convenience of the Internet facilitated the development of electronic commerce (e-commerce). E-commerce research and technologies have always drawn the attention of researchers. Among them, the application of mobile agent on e-commerce has drawn much attention in recent years. Mobile agents can roam freely over different execution environments to execute tasks assigned to them. However, a mobile agent may be attacked when it requests services from other servers or when comes in contact with and exchange information with another agents while roaming on the internet. Hence, a mobile agent user may be concerned that his mobile agent could be corrupted or private information tapped and pirated by other agents. To ensure the security of mobile agents in public network environment, this paper proposes a security scheme that is suitable for mobile agents. The scheme includes access control and key management; it is also an improvement on the key management and access control for mobile agent scheme of Volker and Mehrdad. The proposed scheme corrects the drawback in Volker and Mehrdad’s scheme which is the need of a large amount of storage for storing the secret keys. Security and performance analysis of our scheme proves the proposed scheme to be more efficient and secure.
Unable to display preview. Download preview PDF.
- 3.Corradi, A., Montanari, R., Stefanelli, C.: Security Issues in Mobile Agent Technology. In: Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing Systems, Cape Town, South Africa, pp. 3–8 (1999)Google Scholar
- 4.Hohl, F.: A Model of Attacks Malicious Hosts Against Mobile Agents. In: Proceedings of the 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, Brussels, Belgium, July 21, pp. 105–120 (1998)Google Scholar
- 6.Karnik, N.M., Tripathi, A.R.: A Security Architecture for Mobile Agents in Ajanta. In: Proceedings of The 20th International Conference on Distributed Computing Systems (ICDCS 2000), Taipei, Taiwan, April 2000, pp. 402–409 (2000)Google Scholar
- 7.Lange, D.B., Oshima, M.: Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley Press, Massachusetts (1998)Google Scholar
- 8.Lin, I.C., Ou, H.H., Hwang, M.S.: Two Secure Transportation Schemes for Mobile Agents, Agent-Based Technologies- Information & Security. International Relations and Security Network ISN 8(1), 87–97 (2002)Google Scholar
- 14.Miller, V.S.: Uses of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)Google Scholar