Protecting Integrity and Secrecy of Mobile Agents on Trusted and Non-Trusted Agent Places

نویسندگان

  • Lars Fischer
  • Claudia Eckert
  • Ute Bormann
چکیده

Mobile Software Agents are at the mercy of the agent places they visit on their itinerary. But certain applications have a need for protection of secrecy and integrity of parts of the mobile agents data space. In this paper I will introduce a definition of the term Mobile Software Agent that is derived from a general definition of the term agent and the definition of Wooldridge and Jennings in 1998. I will divide the agents dataspace into four types of data which are used as base for my protection classes. Later I define types of agent operations based on applictions that are proposed by Wooldridge and Jennings. To protect integrity and secrecy of static program and static results of an agent (data types 0 and 2) some protocols have been proposed in different papers. I will examine these protocols and extract general methods from these protocols. As result of this examinations I will incorporate a new method, the Code-Place-Result Relations, into the Chained Digital Signature protocols from Karjoth, Asokan and Gülçü to counter Interleaving Attacks that have been developed by Volker Roth. The examined protocols will then be classified by protection class and used methods. I will show relations between my types of agent operations, protocols, my methods and my protection classes. Of the eight protocols that I will examine I will propose three protocols for further usage; Environmental Key Generation (by Schneier and Riordan) and the two improved Chained Digital Signature Protocols. Additionally I will propose Digital Signatures to provide integrity of static parts. Digital Signatures need a working public key infrastructure or other systems for key distribution to work. Environmental Key Generation is only usable in some settings, for example to protect the identity of an originator of an agent within a mobile ad hoc network. I will introduce a Traffic Information Agent System as an example analysis of threats and recommendations how to protect certain security objectives. In my conclusion I will compare the protection of integrity and secrecy in mobile agents with the protection in the client-server model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Path-Based Security for Mobile Agents

As mobile agents are increasingly adopted in intranets, on the Internet, and on computational grids, new security concerns become increasingly important. Unlike other kinds of mobile code, such as applets, which are pulled a single time to remote systems (single-hop), mobile agents may move using their own itinerary through a series of systems (multiple-hop), potentially carrying sensitive info...

متن کامل

Towards Fault-tolerant Mobile Agents

The absence of a trusted computing base for mobile agents poses serious security issues for both the host system and the survivability of the agent. Once a mobile agent is dispatched, asserting anything about the host system, the agent’s behavior, or even the agent’s existence is difficult to ascertain. In order to employ agents with any degree of confidence, constraints need to be placed on th...

متن کامل

Introducing Trusted Third Parties to the Mobile Agent Paradigm

The mobile agent paradigm gains ever more acceptance for the creation of distributed applications particularly in the domain of electronic commerce In such applications a mobile agent roams the global Internet in search of services for its owner One of the problems with this approach is that malicious service providers on the agent s itinerary can access con dential information contained in the...

متن کامل

Mobile Agents Integrity Research

Mobile agents are an important technology in e-commerce systems and offer new possibilities for the e-commerce applications. This paper examines some mobile agent integrity protocols and proposes a new protecting protocol of mobile agent integrity. It can defend most known attacks, provides encryption transmission and route secrecy of mobile agents.

متن کامل

Mobile Agent Security Through Multi-Agent Cryptographic Protocols

We consider the problem of keeping sensitive data and algorithms contained in a mobile agent from discovery and exploitation by a malicious host. The focus in this paper is on rigorous techniques based on cryptographic protocols. Algesheimer, Cachin, Camenisch, and Karjoth (IEEE Security and Privacy, 2001) devised a secure agent protocol in such a setting, where agents and hosts are mutually di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003