New Implementation of RMI to Protect Integrity and Confidentiality for Mobile Agents

نویسندگان

  • Shinichi Motomura
  • Takao Kawamura
  • Kazunori Sugahara
چکیده

A new implementation of RMI named OnePort RMI is proposed in this paper. OnePort RMI consists of new RMI runtime, classes which are implemented interfaces by RMI specification, and MultiChannelSocketFactory. Using OnePort RMI, when an object on a client invokes methods of remote objects on a server, the client can use sockets of different types to connect one destination port at the same time, and the server can accept incoming call from the sockets on only the port. In order to protect integrity and confidentiality of our mobile agent framework named Maglog, OnePort RMI is introduced into Maglog. In consequence, each agent can select a socket depending on importance of data and programs which are contained in their agents. We emphasize that the proposed OnePort RMI is not only for mobile agent frameworks such as our Maglog but also for any RMI applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Agent Security

Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However, it has not become popular due to some problems such as security. Threats to mobile agent security generally fall into three main classes: disclosure of information, denial of service, and corruption of information. Four threat categories are identified: threats stem...

متن کامل

Constructing Secure Mobile-Agent-Based Consumer Electronic Applications

This paper proposes two appropriate security schemes for protecting consumer electronic applications in mobile agent based networks. As far as mobile agent security is concerned, we develop a proxy signature scheme for protecting mobile agents against malicious agent hosts using the ECC-based self-certified public key cryptosystem. The proposed proxy signature scheme can protect users’ private ...

متن کامل

Specification of the Stream Cipher WG-16 Based Confidentiality and Integrity Algorithms

The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially deployed. Security mechanisms are crucial to protect communications of mobile users from potential malicious attacks as well as to ensure revenue for 4G-LTE network operators. The randomness properties of the keystream generated by the current cipher suites in 4G-LTE standard are difficult to an...

متن کامل

Secure data aggregation using mobile agents in wireless sensor networks

Data aggregation is a widely used technique in wireless sensor networks. The security issues, data confidentiality and integrity, in data aggregation become vital when the sensor network is deployed in a hostile environment. There have been many related work proposed to address these security issues. In this paper, we introduce the concept of mobile agents for secure data aggregation in sensor ...

متن کامل

Protocol design, implementation and integration for the protection of sensor data confidentiality and integrity

Wireless sensor networks are data centric because in many applications, sensor nodes are required to generate data, collect data, storage data and process data queries. Meanwhile, wireless sensor networks are vulnerable to security attacks because they are deployed in unattended (often hostile) environments and do not have tamper resistant hardware. Therefore, secure and efficient data manageme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007