Title :
A mobile agent clone detection system with itinerary privacy
Author :
Lam, T.C. ; Wei, Victor K.
Author_Institution :
Dept. of Inf. Eng., Chinese Univ. of Hong Kong, Shatin, China
Abstract :
We propose a system for the detection of unauthorized cloning of mobile agents by malicious hosts. The system can detect clones after the fact, identify the culprit, and then seek penalties. The agent migration protocol is offline (non-centralized). The itinerary of an agent is privacy-protected. Our scheme is based on H.Y. Wong´s (2001) transferable extension of N. Ferguson´s (1993) single-term offline untraceable e-cash. The main technique is to map the clone detection problem to the double-spending problem in transferable e-cash, and then adopt and adapt existing solutions from the latter field.
Keywords :
computer crime; data privacy; electronic money; mobile agents; agent migration protocol; double-spending problem; itinerary privacy; malicious hosts; mobile agent clone detection system; privacy-protected agent itinerary; single-term offline untraceable e-cash; transferable e-cash; transferable extension; unauthorized cloning detection; Cloning; Computer networks; Cryptography; Electronic commerce; Information retrieval; Information security; Mobile agents; Privacy; Protocols; Resumes;
Conference_Titel :
Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on
Print_ISBN :
0-7695-1748-X
DOI :
10.1109/ENABL.2002.1029991