An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents

被引:0
|
作者
Jalal, Saba [1 ]
King, Brian [1 ]
机构
[1] Indiana Univ Purdue Univ, Purdue Sch Engn & Technol, Indianapolis, IN 46202 USA
来源
关键词
Anonymity; Mobile Agent Security; Mobile Agent Authentication; E-commerce;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security problems that impact mobile agents include authentication and privacy. A challenging task is to implement secure mobile agents that provide anonymity for the mobile agent. Wang, Zhang, and Wang constructed a scheme that provides secure web transactions with anonymous mobile agents over the internet. Our paper will discuss the Wang, Zhang and Wang protocol(WZW) thoroughly, our work demonstrates the weaknesses of the WZW protocol, showing that it is not as secure as it is claimed to be. In this paper, we will construct attacks on the WZW protocol, provide several repairs and construct a secure scheme for conducting E-commerce using anonymous mobile agents.
引用
收藏
页码:426 / +
页数:2
相关论文
共 50 条
  • [41] Efficient Forensic Analysis for Anonymous Attack in Secure Content Distribution
    Jin, Hongxia
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2009, 1 (01) : 59 - 74
  • [42] Towards secure mobile agents
    Aouadi, H
    Ben Ahmed, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 261 - 265
  • [43] Anonymous simple secure m-commerce protocol
    Haddad, E
    King, B
    PSC '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON PERVASIVE SYSTEMS AND COMPUTING, 2005, : 199 - 205
  • [44] An Improved Secure Anonymous Protocol for Distributed Computer Networks
    Chain, Kai
    Kuo, Wen-Chung
    Cheng, Jiin-Chiou
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 141 - 149
  • [45] An Efficient Anonymous Authentication Protocol for Secure Vehicular Communications
    Park, Youngho
    Sur, Chul
    Jung, Chae Duk
    Rhee, Kyung-Hyune
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (03) : 785 - 800
  • [46] Attack against a Pairing Based Anonymous Authentication Protocol
    Hanzlik, Lucjan
    Kluczniak, Kamil
    SOFSEM 2014: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2014, 8327 : 306 - 314
  • [47] A secure mobile agents platform
    Ismail, Leila
    Journal of Communications, 2008, 3 (02): : 1 - 21
  • [48] Trusted Secure Geographic Routing Protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol
    Shajin, Francis H.
    Rajesh, Paulthurai
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2022, 18 (05) : 603 - 621
  • [49] A New Secure Anonymous Protocol for Distributed Computer Networks
    Cui Hui
    Cao Tianjie
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY WORKSHOPS (ISECS 2010), 2010, : 197 - 201
  • [50] On secure and anonymous buyer-seller watermarking protocol
    Deng, Mina
    Preneel, Bart
    2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 524 - +