DocumentCode :
1666463
Title :
A new approach for computation result protection in the mobile agent paradigm
Author :
Songsiri, Suphithat
Author_Institution :
Dept. of Commun. Syst., Fern Univ., Hagen, Germany
fYear :
2005
Firstpage :
575
Lastpage :
581
Abstract :
One of the primary security challenges of the mobile agent paradigm is that of protecting the result of computation carried out by a mobile agent against an attack by a malicious host. There are various proposals that appeared in the literature. Beside their benefits, a well-known vulnerability of their technique is the collusion attack. The collusion attack mainly considered in this paper is the two colluders truncation attack, which could be engendered by the leakage of a one time private key. This paper demonstrates the prevention of the two colluders truncation attack, the detection of other forms of collusion attacks, and the identification of the malicious host. The proposed protocol incorporates and extends the notion of publicly verified chained signature (G. Karjoth, et al., 1998) by using a list of route information and a trusted third party to generate a one time public/private key pair.
Keywords :
mobile agents; security of data; chained signature; colluders truncation attack; collusion attack; malicious host identification; mobile agent paradigm; result protection; route information; Communication system security; Containers; Data security; Message authentication; Mobile agents; Proposals; Protection; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 2005. ISCC 2005. Proceedings. 10th IEEE Symposium on
ISSN :
1530-1346
Print_ISBN :
0-7695-2373-0
Type :
conf
DOI :
10.1109/ISCC.2005.14
Filename :
1493783
Link To Document :
بازگشت