Abstract
Security and anonymity are vital for free-roaming mobile agent-based applications. Based on anonymous onion routing, this paper proposes a security protocol to defend truncation attacks for free-roaming mobile agent-based applications. This protocol uses “two hops forwards and k anonymous hops backwards” chain relation to implement the generally accepted mobile agent security properties. Security analysis proves that this protocol can defend known attacks, especially multiple colluded truncation attacks and provide privacy protection to previously visited servers. Performance evaluation shows this protocol requires limited communication overhead if right parameters are chosen.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Karjoth, G., Asokan, N., Gülcü, C.: Protecting the computation results of free-roaming agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 195–207. Springer, Heidelberg (1998)
Karnik, N.M., Tripathi, A.R.: Security in the Ajanta Mobile Agent System. Technical Report TR-5-99, University of Minnesota, Minneapolis, MN 55455, USA (1999)
Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents Protection in the Internet Environment. In: 23rd Annual International Computer Software and Applications Conference (COMPSAC 1999), Phoenix, AZ, USA, pp. 80–85 (1999)
Xu, D., Harn, L., Narasimhan, M., Luo, J.: An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. In: 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), Chicago, USA, pp. 309–314 (2006)
Cheng, J., Wei, V.: Defenses against the truncation of computation results of free-roaming agents. In: 4th International Conference on Information and Communications Security, Singapore, pp. 1–12 (2002)
Yao, M., Foo, E., Dawson, E.P., Peng, K.: An Improved Forward Integrity Protocol for Mobile Agents. In: 4th International Workshop on Information Security Applications (WISA 2003, Jeju Island, Korea, pp. 272–285 (2003)
Songsiri, S.: A New Approach for Computation Result Protection in the Mobile Agent Paradigm. In: 10th IEEE Symposium on Computers and Communications (ISCC 2005), Cartagena, Spain, pp. 575–581 (2005)
Zhou, J., Onieva, J., Lopez, J.: Protecting Free Roaming Agents against Result-Truncation Attack. In: 60th IEEE Vehicular Technology Conference, Los Angles, USA, pp. 3271–3274 (2004)
Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE Journal Selected Areas in Communications 16(4), 482–494 (1998)
Gomez-Martinez, E., IIarri, S., Merseguer, J.: Performance analysis of mobile agents tracking. In: 6th international workshop on Software and performance, Buenes Aires, Argentina, pp. 181–188 (2007)
Chmiel, K., Gawinecki, M., Kaczmarek, P., Szymczak, M., Paprzycki, M.: Efficiency of JADE agent platform. Scientific Programming 13(2), 159–172 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, X., Xu, D., Luo, J. (2008). A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_47
Download citation
DOI: https://doi.org/10.1007/978-3-540-69295-9_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69294-2
Online ISBN: 978-3-540-69295-9
eBook Packages: Computer ScienceComputer Science (R0)