The Mobile Agent security enhanced by trusted computing technology

被引:0
|
作者
Wu, Xiaoping [1 ]
Shen, Zhidong [1 ]
Zhang, Huanguo [1 ]
机构
[1] Wuhan Univ, Sch Comp, Wuhan 430079, Peoples R China
关键词
trusted computing; Mobile Agent security; trusted platform module;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Mobile Agent (MA) technology has been widely used to archive plenty of applications in distributed systems. The mobile agents are completely exposed in different hosts and easy to be attacked by different adversaries. In this paper, the requirements for security of MA are analyzed. Considering the security and safety problems both in software and hardware, we construct a way to build a trusted computing environment for MA by using the trusted computing technology. The trusted platform module (TPM) is integrated into the mobile agent platform. In the TPM enabled schemes for MA, some innovations, such as authentication, MA software integrity, secure group communication and secure storage, are provided to improve the security of MA.
引用
收藏
页码:1234 / 1237
页数:4
相关论文
共 50 条
  • [41] Enforcing trust in pervasive computing with trusted computing technology
    Li, Shiqun
    Balfe, Shane
    Zhou, Jianying
    Chen, Kefei
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2006, 4347 : 195 - +
  • [42] Trusted computing and advanced security in edge computing and Internet of Things
    Cang, Li Shan
    Al-Dubai, Ahmed
    Song, Houbing
    Mumtaz, Shahid
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (06):
  • [43] Trusted computing - Path to security or road to servitude?
    Hilley, Sarah
    [J]. Network Security, 2004, 2004 (08) : 12 - 15
  • [44] A scheme based on trusted computing for terminal security
    Zhang, Jun
    Liu, Wei-peng
    Zhou, Zheng
    Li, Jian
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 218 - +
  • [45] An Improved Grid Security Infrastructure by Trusted Computing
    YAN Fei~ 1
    2. College of Computer Science and Technology
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1805 - 1808
  • [46] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    [J]. NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [47] Research of Trusted Network Security Technology
    Gan, XiaoYing
    Liu, Bin
    [J]. ADVANCES IN MECHANICAL ENGINEERING, PTS 1-3, 2011, 52-54 : 713 - +
  • [48] The Role of Trusted Computing in Secure Agent Migration
    Munoz, Antonio
    Mana, Antonio
    Serrano, Daniel
    [J]. RCIS 2009: PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, : 255 - +
  • [49] Trusted mobile computing: An overview of existing solutions
    Bouazzouni, Mohamed Amine
    Conchon, Emmanuel
    Peyrard, Fabrice
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 596 - 612
  • [50] Trusted Platforms to secure Mobile Cloud Computing
    Thinh Le Vinh
    Bouzefrane, Samia
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 1068 - 1075