Mobile Agents Protection in the Internet Environment
COMPSAC '99 23rd International Computer Software and Applications Conference
Defenses against the Truncation of Computation Results of Free-Roaming Agents
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Protecting the Computation Results of Free-Roaming Agents
MA '98 Proceedings of the Second International Workshop on Mobile Agents
A New Approach for Computation Result Protection in the Mobile Agent Paradigm
ISCC '05 Proceedings of the 10th IEEE Symposium on Computers and Communications
An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
Performance analysis of mobile agents tracking
WOSP '07 Proceedings of the 6th international workshop on Software and performance
Efficiency of JADE agent platform
Scientific Programming - International Symposium of Parallel and Distributed Computing & International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogenous Networks
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Security and anonymity are vital for free-roaming mobile agent-based applications. Based on anonymous onion routing, this paper proposes a security protocol to defend truncation attacks for free-roaming mobile agent-based applications. This protocol uses "two hops forwards and k anonymous hops backwards" chain relation to implement the generally accepted mobile agent security properties. Security analysis proves that this protocol can defend known attacks, especially multiple colluded truncation attacks and provide privacy protection to previously visited servers. Performance evaluation shows this protocol requires limited communication overhead if right parameters are chosen.