Mobile Agents Integrity Research
نویسندگان
چکیده
Mobile agents are an important technology in e-commerce systems and offer new possibilities for the e-commerce applications. This paper examines some mobile agent integrity protocols and proposes a new protecting protocol of mobile agent integrity. It can defend most known attacks, provides encryption transmission and route secrecy of mobile agents.
منابع مشابه
Securing Mobile Agents Through Evaluation of Encrypted Functions∗
The mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However, it has not become popular due to some problems such as security. The fact that computers have complete control over all the programs makes it very hard to protect mobile agents from untrusted hosts. In this paper we propose a security approach for mobile agents,...
متن کاملIntegrity protection for Code-on-Demand mobile agents in e-commerce
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection i...
متن کاملMobile Agent Data Integrity Using Multi-agent Architecture
Protection of agent data state and partial results in mobile agent systems continues to draw research interest. Current solutions to integrity attacks are geared at detection of malicious activity a posteriori. We propose multi-agent architecture that uses cooperating multi-hop and single-hop agents to prevent such attacks and discuss security features of our scheme. We also examine data protec...
متن کاملSecure Data Collection with Updates
This paper describes a protocol to protect data collected by mobile agents roaming through a set of potentially malicious hosts. This protocol is based on an original secure cryptographic technique that assures the integrity of a sequence of data segments regardless of the order of each segment in the sequence. The protocol allows each host to update the data it previously submitted in a way th...
متن کاملSecure Migration of Mobile Agents based on Distributed Trust
Integrity of mobile agents in open environments in which no guarantees can be provided on the integrity of the hosts on which they run, is an open challenge. This paper presents a method with which tampering can be detected. This method is based on the notion of distributed trust; trust distributed over the hosts involved.
متن کامل