Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent

نویسندگان

  • G. Geetha
  • C. Jayakumar
چکیده

Mobile agent plays an important role in developing applications of open, distributed and mixed environments, such as the internet. Mobile agent or mobile software agent is piece of software that can operate autonomously to accomplish user assigned task. To explain more, mobile agent is the process which can migrate to hosts autonomously. As an agent travels to do execution in different environment in different host or servers, the agents are in need of protecting themselves and their data from various types of attacks. So providing security to the mobile agent (static code) and its data (dynamic code) is an emerging need in Mobile Agent Technology. The change in Mobile Agent (MA) code can be identified due its static nature where as finding change in mobile agent data is the biggest challenge especially in malicious host’s attacks. This study presents Clone Return Process (CRP) method to protect the data of free roaming mobile agent against colluded truncation attack. By using CRP, malicious host are identified and recovery of mobile agent is easily done. So free roaming mobile agent communicates with other servers and protects its computation results (data) in an efficient way.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A More Secure and Efficient Authentication Scheme with Roaming Service and User Anonymity for Mobile Communications

In terms of convenience requirements, mobile communications have become one of the most important roaming services for wireless environments. Especially, how to prevent unauthorized users from illegitimate accesses in mobile communication systems has become an important issue. Password authentication with smart card is one of the mechanisms that were widely used to authenticate the validity of ...

متن کامل

An Isabelle formalization of protocol-independent secrecy with an application to e-commerce

A protocol-independent secrecy theorem is established and applied to several non-trivial protocols. In particular, it is applied to protocols proposed for protecting the computation results of free-roaming mobile agents doing comparison shopping. All the results presented here have been formally proved in Isabelle by building on Larry Paulson’s inductive approach. This therefore provides a libr...

متن کامل

A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Efficient and Secure Authentication Protocols for Mobile VoIP Communications

Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerable to information security. In this paper, we present two efficient and secure authentication protocols for mobile VoIP services. In our approaches, we first develop a secure authentication protocol for mobile IP regist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JCS

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2014