Reliable cascaded delegation scheme for mobile agent environments

被引:0
|
作者
Lee, HS [1 ]
Kwon, HM
Eom, YI
机构
[1] Sungkyunkwan Univ, Sch Informat & Commun Engn, Suwon 300, Kyunggido, South Korea
[2] HFR Inc, Sungham 463810, Kyunggi Do, South Korea
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile agent environments, migration of an agent occurs continuously due to the mobility of the agent. So, cascaded delegation can occur among places for delegating the privilege to execute the agent. Because the existing delegation scheme considers only the delegation between two places that participate in migration of an agent, it does not support secure cascaded delegation. In this paper, we propose a cascaded delegation scheme that provides agents with secure cascaded delegation in mobile agent environments. Depending on the trust-relationship among places, the proposed scheme achieves the goal by nesting each delegation token or by nesting only initial token signed by sender of the agent within the signed part of the next immediate delegation token. We prove that the proposed scheme is secure against the attack of replaying a message and the attack of substituting a delegation token.
引用
收藏
页码:55 / 68
页数:14
相关论文
共 50 条
  • [1] A nested token-based delegation scheme for cascaded delegation in mobile agent environments
    Kwon, HM
    Kim, MJ
    Eom, YI
    [J]. WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 537 - 547
  • [2] A Reliable Communication Protocol for Multiregion Mobile Agent Environments
    Choi, SungJin
    Baik, MaengSoon
    Kim, HongSoo
    Byun, EunJoung
    Choo, Hyunseung
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (01) : 72 - 85
  • [3] An efficient and reliable E-DRM scheme for mobile environments
    Chang, Chin-Chen
    Yang, Jen-Ho
    Wang, Da-Wei
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (09) : 6176 - 6181
  • [4] An efficient traceable access control scheme with reliable key delegation in mobile cloud computing
    Zhitao Guan
    Jing Li
    Ying Zhang
    Ruzhi Xu
    Zhuxiao Wang
    Tingting Yang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2016
  • [5] An efficient traceable access control scheme with reliable key delegation in mobile cloud computing
    Guan, Zhitao
    Li, Jing
    Zhang, Ying
    Xu, Ruzhi
    Wang, Zhuxiao
    Yang, Tingting
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,
  • [6] Lightweight mobile agent authentication scheme for home network environments
    Kim, JG
    Kim, GS
    Eom, YI
    [J]. COMPUTATIONAL AND INFORMATION SCIENCE, PROCEEDINGS, 2004, 3314 : 853 - 859
  • [7] MAWA: An efficient and reliable web access scheme in mobile wireless environments based on mobile agents
    Hu, Haiyang
    Hu, Hua
    Ling, Yun
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2008, 45 (04): : 636 - 645
  • [8] The K-fault-tolerant checkpointing scheme for the reliable mobile agent system
    Park, T
    Youn, J
    [J]. PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 577 - 581
  • [9] Provable Secure AKA Scheme with Reliable Key Delegation in UNITS
    Huang, Yu-Lun
    Shen, C. Y.
    Shieh, Shiuhpyng
    Wang, Hung-Jui
    Lin, Cheng-Chun
    [J]. 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 243 - 252
  • [10] A reliable mobile agent communication protocol
    Cao, JN
    Zhang, L
    Yang, J
    Das, SK
    [J]. 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 468 - 475