Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent
نویسندگان
چکیده
Mobile agent plays an important role in developing applications of open, distributed and mixed environments, such as the internet. Mobile agent or mobile software agent is piece of software that can operate autonomously to accomplish user assigned task. To explain more, mobile agent is the process which can migrate to hosts autonomously. As an agent travels to do execution in different environment in different host or servers, the agents are in need of protecting themselves and their data from various types of attacks. So providing security to the mobile agent (static code) and its data (dynamic code) is an emerging need in Mobile Agent Technology. The change in Mobile Agent (MA) code can be identified due its static nature where as finding change in mobile agent data is the biggest challenge especially in malicious host’s attacks. This study presents Clone Return Process (CRP) method to protect the data of free roaming mobile agent against colluded truncation attack. By using CRP, malicious host are identified and recovery of mobile agent is easily done. So free roaming mobile agent communicates with other servers and protects its computation results (data) in an efficient way.
منابع مشابه
A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications
In terms of convenience requirements, mobile communications have become one of the most important roaming services for wireless environments. Especially, how to prevent unauthorized users from illegitimate accesses in mobile communication systems has become an important issue. Password authentication with smart card is one of the mechanisms that were widely used to authenticate the validity of ...
متن کاملAn Isabelle formalization of protocol-independent secrecy with an application to e-commerce
A protocol-independent secrecy theorem is established and applied to several non-trivial protocols. In particular, it is applied to protocols proposed for protecting the computation results of free-roaming mobile agents doing comparison shopping. All the results presented here have been formally proved in Isabelle by building on Larry Paulson’s inductive approach. This therefore provides a libr...
متن کاملA Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity
Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity...
متن کاملAn Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملEfficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerable to information security. In this paper, we present two efficient and secure authentication protocols for mobile VoIP services. In our approaches, we first develop a secure authentication protocol for mobile IP regist...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JCS
دوره 10 شماره
صفحات -
تاریخ انتشار 2014