A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts
نویسنده
چکیده
Mobile agents have been considered a promising technology to develop e-commerce applications, however the security concerns about the technology have stopped its widespread use. The identified security areas comprise protecting hosts against malicious agents, protecting the agent’s transmission and protecting agents against malicious hosts. The first two security issues and the protection of the code state of the agent can be solved by applying traditional security techniques. Even though there are some works that manage the data state protection, its implementation is almost unfeasible in terms of performance and complexity. This paper describes a fast and easy to implement algorithm that a mobile agent can use to encrypt its data during its itinerary. The algorithm only makes use of a bitmap and XOR operations. The algorithm consist of applying XOR operations to the data to be ciphered and a random bitmap, while the map is repeatedly shifted to the right or to the left in order to compute a CRC field for validation against malicious tampering. The method only uses basic bit operations so that its implementation is very easy to develop. Besides, since it does not use any computationally expensive cryptographic technique (i.e. digital signatures) it is very fast. In this way we manage to have a secure, simple, fast and feasible protection algorithm to protect data while mobile agents are roaming, where simplicity and performance are its better advantages. c ©2001 Published by Elsevier Science B. V.
منابع مشابه
Protection of a mobile agent with a reference clone
Many areas such as electronic commerce, network management and information retrieval can benefit from the application of mobile agents technologies. The exploitation of mobile agents offers several advantages such as reduction of network latency, asynchronous execution, fault-tolerant behavior. However, a wider use of mobile agents is currently limited by the lack of a comprehensive security fr...
متن کاملAn infrastructure for detecting and punishing malicious hosts using mobile agent watermarking
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. In such scenario there are some security issues that must be considered. In particular, this article deals with the protection of mobile agents against manipulation attacks performed by the host, which is one of the main security issues to solve in mobile ...
متن کاملA Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
Mobile agents are software entities consisting of code, data, state and itinerary that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agent systems. In parti...
متن کاملProtecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree
Threat diagnostic, using AND/OR tree and risk analysis, is a mechanism to protect mobile agents against malicious host attacks. The method is based on analyzing the probable causes of mobile agent failure to perform its intended function. It uses the symptoms of different types of malicious host attacks and arranges them in a logical order depending on the expected outcomes. We provide a method...
متن کاملPOM - A Mobile Agent Security Model against Malicious Hosts
Security, especially the attacks performed by hosts to the visiting mobile agents (the malicious hosts problem), is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agents, the host has full control over them and could easily perform many kinds of attacks against them. This problem has not been full solved yet. After the ...
متن کامل