Title :
Boosting m-business using a truly secured protocol for data gathering mobile agents
Author :
Al-Jaljouli, Raja
Author_Institution :
Sch. of Comput. Sci. & Eng., New South Wales Univ., Sydney, NSW, Australia
Abstract :
The paper focuses on the security issue of employing mobile agents in m-business. The trustworthiness of mobile agents is crucial to the success of m-business. To be trustworthy, a mobile agent must protect its gathered data against adversaries encountered while traversing the Internet. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals security flaws, such as truncation, alteration, or breach of privacy of gathered data. We present an accurate security protocol for data gathering mobile agents. The protocol uses co-operating agents, performs verifications during agent´s lifecycle in addition to the verifications upon agent´s return to the originator. It also implements special security techniques on the top of the common techniques, which would rectify revealed flaws. We prove its correctness by verifying the security properties: authenticity, confidentiality, and strong integrity using STA, an infinite-state exploration formal method.
Keywords :
Internet; business communication; cryptography; electronic commerce; formal verification; mobile agents; protocols; Internet; cooperating agent; cryptographic protocol; data security; formal verification; infinite-state exploration formal method; m-business; mobile agent; secured protocol; security protocol; Boosting; Computer science; Computer security; Cryptographic protocols; Data engineering; Data privacy; Data security; Internet; Mobile agents; Protection;
Conference_Titel :
Mobile Business, 2005. ICMB 2005. International Conference on
Print_ISBN :
0-7695-2367-6
DOI :
10.1109/ICMB.2005.23