A Pairing-Based Authentication Scheme for Protecting Multiple Mobile Agent Hosts
نویسنده
چکیده
A mobile agent is an autonomous software program, which can be executed in different agent platforms for a specific task on behalf of a customer. Security is one of the key issues for mobile agent technology while the mobile agents are applied to the developments of e-commerce. Therefore, this paper focuses on a mobile agent authentication scheme for safeguarding mobile agent platforms or hosts based on the proposed integrated pairing-based public key cryptosystem. Furthermore, we employ a proxy signature scheme to accomplish mobile agent authentication for protecting mobile agent hosts. In other words, in the proposed authentication scheme a mobile agent can register once to a certification authority for services from multiple mobile agent hosts. Moreover, security analyses about a variety of attacks on the proposed authentication scheme validate the feasibility of the scheme. In summary, the proposed authentication schemes can make mobile agent hosts or platforms securely workable. Key-Words: Mobile agent, Authentication scheme, Agent security, Pairing-based public key cryptosystem, Self-certified public key cryptosystem, Proxy signature
منابع مشابه
Constructing Secure Mobile-Agent-Based Consumer Electronic Applications
This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users’ private ...
متن کاملD'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we discuss these three issues in the context of D’Agents, a mobile-agent system whose agents can be written in Tcl, Java and Scheme. (D’Agents was formerly known as Agent Tcl.) First we discuss mechanisms existing in D’Agents for pr...
متن کاملPath-Based Security for Mobile Agents
As mobile agents are increasingly adopted in intranets, on the Internet, and on computational grids, new security concerns become increasingly important. Unlike other kinds of mobile code, such as applets, which are pulled a single time to remote systems (single-hop), mobile agents may move using their own itinerary through a series of systems (multiple-hop), potentially carrying sensitive info...
متن کاملA Security Scheme for Mobile Agent Platforms in Large-Scale Systems
Mobile agents have recently started being deployed in largescale distributed systems. However, this new technology brings some security concerns of its own. In this work, we propose a security scheme for protecting mobile agent platforms in large-scale systems. This scheme comprises a mutual authentication protocol for the platforms involved, a mobile agent authenticator, and a method for gener...
متن کاملSecurity Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust
This work defines a security scheme, based on SPKI/SDSI chains of trust, for protecting mobile agent platforms in large-scale distributed systems. The scheme is composed by a protocol of mutual authentication, a mobile agent authenticator and a mechanism for the generation of protection domain. Due to the flexibility of the SPKI/SDSI certificate delegation infrastructures used, the proposed sch...
متن کامل