Mobile-Agent's Self-Reliant Host Security Examination

被引:0
|
作者
Irwan [1 ]
Langi, Armein Z. R. [1 ]
Husni, Emir [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
关键词
mobile agent; malicious host; blind signature; proof of knowledge;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile agent brings new concept on programming, especially on distributed computing paradigm. It attracts great interest because of its mobility, autonomy and persistence. But it also brings security issues i.e. insecure networks, malicious agents, malicious hosts and malicious users. One most difficult issues is protecting mobile agent from malicious host because mobile agent execute its code on host so that host can do many things to manipulate data, code and control flow of mobile agent. This paper proposes mobile-agent's self-reliant host security examination so that mobile agent is able to identify malicious host. In this proposed scheme, every hosts must have signature in blinded form in order to ensure unauthorized host cannot use this signature. This signature serves to distinguish malicious hosts with trusted host. When mobile agent arrives at new host, it will check validation of host's signature. Mobile agent also gives challenge to host, and host has to give a valid response. If host cannot give valid signature and response, mobile agent will identify this host as malicious host and return to its previous host. Zero knowledge proof of knowledge is used on challenge-response phase so that private keys cannot be revealed.
引用
收藏
页数:4
相关论文
共 31 条
  • [1] Self-reliant mobile code: a new direction of agent security
    Srivastava, Shashank
    Nandi, G. C.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 : 62 - 75
  • [2] A Mobile-agent Security Architecture
    Lin, DeShu
    Huang, TingLei
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 477 - 480
  • [3] The Research on Mobile-agent Security
    WANG Ru chuan
    [J]. The Journal of China Universities of Posts and Telecommunications, 2002, (03) : 47 - 52
  • [4] A stronger Common Foreign and Security Policy for a self-reliant Union?
    不详
    [J]. COMMON MARKET LAW REVIEW, 2018, 55 (06): : 1675 - 1684
  • [5] Self-reliant women in Frances Harper's writings
    Hoeller, H
    [J]. ATQ-19TH C AMERICAN LITERATURE AND CULTURE, 2005, 19 (03): : 205 - 220
  • [6] Suharto pledges Indonesia's factories will be self-reliant
    Mecham, M
    [J]. AVIATION WEEK & SPACE TECHNOLOGY, 1996, 145 (01): : 66 - 66
  • [7] Robustness and security in a mobile-agent based network monitoring system
    Tripathi, A
    Koka, M
    Karanth, S
    Osipkov, I
    Talkad, H
    Ahmed, T
    Johnson, D
    Dier, S
    [J]. INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, : 320 - 321
  • [8] Java-Based Mobile-Agent Systems in the Real World: Security Highlights
    University of West Bohemia, Department of Computer Science and Engineering, Pilsen, Czech Republic
    [J]. 1600, 151-159 (2005):
  • [9] "A Fine and Self-Reliant Group of Women": Women's Leadership in the Female Confectioners Union
    Brigden, Cathy
    [J]. LABOUR HISTORY, 2013, (104) : 49 - 64
  • [10] Korean Immigrant Women's Journey from Abused Wives to Self-Reliant Women
    Lee, Youn Mi
    Bell-Scott, Patricia
    [J]. WOMEN & THERAPY, 2009, 32 (04) : 377 - 392