The Mobile Agent security enhanced by trusted computing technology

被引:0
|
作者
Wu, Xiaoping [1 ]
Shen, Zhidong [1 ]
Zhang, Huanguo [1 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430079, Peoples R China
关键词
trusted computing; Mobile Agent security; trusted platform module;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Mobile Agent (MA) technology has been widely used to archive plenty of applications in distributed systems. The mobile agents are completely exposed in different hosts and easy to be attacked by different adversaries. In this paper, the requirements for security of MA are analyzed. Considering the security and safety problems both in software and hardware, we construct a way to build a trusted computing environment for MA by using the trusted computing technology. The trusted platform module (TPM) is integrated into the mobile agent platform. In the TPM enabled schemes for MA, some innovations, such as authentication, MA software integrity, secure group communication and secure storage, are provided to improve the security of MA.
引用
收藏
页码:1234 / 1237
页数:4
相关论文
共 50 条
  • [1] A Trusted Computing Technology for The Security of Mobile Agent
    Shen, Zhidong
    Wu, Xiaoping
    Honggen Xing
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 124 - 127
  • [2] A Security Technology for Mobile Agent System Improved by Trusted Computing Platform
    Shen, Zhidong
    Tong, Qiang
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 46 - +
  • [3] Integrity Measurement Enhanced Security for Mobile Agent Based on Trusted Computing Platform
    Wu, Xiaoping
    Zhang, Huanguo
    Shen, Zhidong
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4805 - +
  • [4] Mobile Security and Trusted Computing
    Mitchell, Chris
    [J]. IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326
  • [5] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing
    Li, Ming
    Fang, Yuan
    Liu, Jun
    [J]. AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
  • [6] An enhanced scheme of enforcing DTE security policy based on trusted computing technology
    Liu, Wei-Peng
    Zuo, Xiao-Dong
    Huang, Qiang
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3657 - +
  • [7] A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
    WANG Juan
    LIN Wutao
    LI Haoyu
    DU Bianxia
    MENG Ke
    WANG Jiang
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 379 - 384
  • [8] Based on Trusted Computing Solutions for Mobile Payment Terminal Security
    Yu, Haiyong
    Li, Peng
    [J]. NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
  • [9] Mobile Trusted Computing
    Asokan, N.
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Rajan, Anand
    Rozas, Carlos
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Wachsmann, Christian
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1189 - 1206
  • [10] Wireless LAN Security Enhancement through Trusted Computing Technology
    She, Xinping
    Xu, Jianming
    [J]. APPLIED DECISIONS IN AREA OF MECHANICAL ENGINEERING AND INDUSTRIAL MANUFACTURING, 2014, 577 : 986 - +