An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents

被引:0
|
作者
Jalal, Saba [1 ]
King, Brian [1 ]
机构
[1] Indiana Univ Purdue Univ, Purdue Sch Engn & Technol, Indianapolis, IN 46202 USA
来源
关键词
Anonymity; Mobile Agent Security; Mobile Agent Authentication; E-commerce;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security problems that impact mobile agents include authentication and privacy. A challenging task is to implement secure mobile agents that provide anonymity for the mobile agent. Wang, Zhang, and Wang constructed a scheme that provides secure web transactions with anonymous mobile agents over the internet. Our paper will discuss the Wang, Zhang and Wang protocol(WZW) thoroughly, our work demonstrates the weaknesses of the WZW protocol, showing that it is not as secure as it is claimed to be. In this paper, we will construct attacks on the WZW protocol, provide several repairs and construct a secure scheme for conducting E-commerce using anonymous mobile agents.
引用
收藏
页码:426 / +
页数:2
相关论文
共 50 条
  • [31] A secure anonymous voting protocol with a complete supervision
    Jan, JK
    Chen, YY
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2002, 17 (4-5): : 213 - 221
  • [32] A Provably Secure, Lightweight Protocol for Anonymous Authentication
    Katz, Jonathan
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 271 - 288
  • [33] Anonymous Location Aided Secure Routing Protocol
    Manjuladevi, V.
    Bharathi, R. Jennie
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
  • [34] A provably secure pairing-free anonymous handover authentication protocol for mobile wireless networks
    Ogundoyin, Sunday Oyinlola
    INTERNATIONAL JOURNAL OF MOBILE COMMUNICATIONS, 2020, 18 (05) : 509 - 539
  • [35] Using Mobile Device to Design A Secure Transaction
    Chen, Chin-Ling
    Jan, Jinn-Ke
    Chien, Chih-Feng
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 833 - 838
  • [36] Effective elections for anonymous mobile agents
    Das, Shantanu
    Flocchini, Paola
    Nayak, Amiya
    Santoro, Nicola
    ALGORITHMS AND COMPUTATION, PROCEEDINGS, 2006, 4288 : 732 - +
  • [37] A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy
    Fang, Liming
    Li, Minghui
    Liu, Zhe
    Lin, Changting
    Ji, Shouling
    Zhou, Anni
    Susilo, Willy
    Ge, Chunpeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 3564 - 3578
  • [38] Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc Networks
    Yerneni, Rajesh
    Sarje, Ani K.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [39] Secure Authentication Protocol for Mobile
    Kalaichelvi, V.
    Chandrasekaran, R. M.
    ICCN: 2008 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING, 2008, : 38 - +
  • [40] STAC-Protocol: Secure and Trust Anonymous Communication Protocol for IoT
    Jebri, Sarra
    Abid, Mohamed
    Bouallegue, Ammar
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 365 - 370