[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards

  • Conference paper
Autonomic and Trusted Computing (ATC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5060))

Included in the following conference series:

Abstract

Security and anonymity are vital for free-roaming mobile agent-based applications. Based on anonymous onion routing, this paper proposes a security protocol to defend truncation attacks for free-roaming mobile agent-based applications. This protocol uses “two hops forwards and k anonymous hops backwards” chain relation to implement the generally accepted mobile agent security properties. Security analysis proves that this protocol can defend known attacks, especially multiple colluded truncation attacks and provide privacy protection to previously visited servers. Performance evaluation shows this protocol requires limited communication overhead if right parameters are chosen.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Karjoth, G., Asokan, N., Gülcü, C.: Protecting the computation results of free-roaming agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 195–207. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  2. Karnik, N.M., Tripathi, A.R.: Security in the Ajanta Mobile Agent System. Technical Report TR-5-99, University of Minnesota, Minneapolis, MN 55455, USA (1999)

    Google Scholar 

  3. Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents Protection in the Internet Environment. In: 23rd Annual International Computer Software and Applications Conference (COMPSAC 1999), Phoenix, AZ, USA, pp. 80–85 (1999)

    Google Scholar 

  4. Xu, D., Harn, L., Narasimhan, M., Luo, J.: An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. In: 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), Chicago, USA, pp. 309–314 (2006)

    Google Scholar 

  5. Cheng, J., Wei, V.: Defenses against the truncation of computation results of free-roaming agents. In: 4th International Conference on Information and Communications Security, Singapore, pp. 1–12 (2002)

    Google Scholar 

  6. Yao, M., Foo, E., Dawson, E.P., Peng, K.: An Improved Forward Integrity Protocol for Mobile Agents. In: 4th International Workshop on Information Security Applications (WISA 2003, Jeju Island, Korea, pp. 272–285 (2003)

    Google Scholar 

  7. Songsiri, S.: A New Approach for Computation Result Protection in the Mobile Agent Paradigm. In: 10th IEEE Symposium on Computers and Communications (ISCC 2005), Cartagena, Spain, pp. 575–581 (2005)

    Google Scholar 

  8. Zhou, J., Onieva, J., Lopez, J.: Protecting Free Roaming Agents against Result-Truncation Attack. In: 60th IEEE Vehicular Technology Conference, Los Angles, USA, pp. 3271–3274 (2004)

    Google Scholar 

  9. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE Journal Selected Areas in Communications 16(4), 482–494 (1998)

    Article  Google Scholar 

  10. Gomez-Martinez, E., IIarri, S., Merseguer, J.: Performance analysis of mobile agents tracking. In: 6th international workshop on Software and performance, Buenes Aires, Argentina, pp. 181–188 (2007)

    Google Scholar 

  11. Chmiel, K., Gawinecki, M., Kaczmarek, P., Szymczak, M., Paprzycki, M.: Efficiency of JADE agent platform. Scientific Programming 13(2), 159–172 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Chunming Rong Martin Gilje Jaatun Frode Eika Sandnes Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, X., Xu, D., Luo, J. (2008). A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69295-9_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69294-2

  • Online ISBN: 978-3-540-69295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics