A Pairing-Based Authentication Scheme for Protecting Multiple Mobile Agent Hosts

نویسنده

  • WOEI-JIUNN TSAUR
چکیده

A mobile agent is an autonomous software program, which can be executed in different agent platforms for a specific task on behalf of a customer. Security is one of the key issues for mobile agent technology while the mobile agents are applied to the developments of e-commerce. Therefore, this paper focuses on a mobile agent authentication scheme for safeguarding mobile agent platforms or hosts based on the proposed integrated pairing-based public key cryptosystem. Furthermore, we employ a proxy signature scheme to accomplish mobile agent authentication for protecting mobile agent hosts. In other words, in the proposed authentication scheme a mobile agent can register once to a certification authority for services from multiple mobile agent hosts. Moreover, security analyses about a variety of attacks on the proposed authentication scheme validate the feasibility of the scheme. In summary, the proposed authentication schemes can make mobile agent hosts or platforms securely workable. Key-Words: Mobile agent, Authentication scheme, Agent security, Pairing-based public key cryptosystem, Self-certified public key cryptosystem, Proxy signature

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Constructing Secure Mobile-Agent-Based Consumer Electronic Applications

This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users’ private ...

متن کامل

D'Agents: Security in a Multiple-Language, Mobile-Agent System

Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we discuss these three issues in the context of D’Agents, a mobile-agent system whose agents can be written in Tcl, Java and Scheme. (D’Agents was formerly known as Agent Tcl.) First we discuss mechanisms existing in D’Agents for pr...

متن کامل

Path-Based Security for Mobile Agents

As mobile agents are increasingly adopted in intranets, on the Internet, and on computational grids, new security concerns become increasingly important. Unlike other kinds of mobile code, such as applets, which are pulled a single time to remote systems (single-hop), mobile agents may move using their own itinerary through a series of systems (multiple-hop), potentially carrying sensitive info...

متن کامل

A Security Scheme for Mobile Agent Platforms in Large-Scale Systems

Mobile agents have recently started being deployed in largescale distributed systems. However, this new technology brings some security concerns of its own. In this work, we propose a security scheme for protecting mobile agent platforms in large-scale systems. This scheme comprises a mutual authentication protocol for the platforms involved, a mobile agent authenticator, and a method for gener...

متن کامل

Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust

This work defines a security scheme, based on SPKI/SDSI chains of trust, for protecting mobile agent platforms in large-scale distributed systems. The scheme is composed by a protocol of mutual authentication, a mobile agent authenticator and a mechanism for the generation of protection domain. Due to the flexibility of the SPKI/SDSI certificate delegation infrastructures used, the proposed sch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006