On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)

  • Authors:
  • Abid Khan;Qasim Arshad;Xiamu Niu;Zhang Yong;Muhammad Waqas Anwar

  • Affiliations:
  • Department of Computer Science, COMSATS Instiutute of Information Technology, Islamabad, Pakistan and Department of Computer Science &Technology, Harbin Instiute of Technology, Shenzhen Graduate S ...;Department of Computer Science, COMSATS Instiutute of Information Technology, Islamabad, Pakistan and New Jersey Science and Technology University(NJIT), USA;Department of Computer Science &Technology, Harbin Instiute of Technology, Shenzhen Graduate School, Shenzhen, P.R. China;Department of Computer Science &Technology, Harbin Instiute of Technology, Shenzhen Graduate School, Shenzhen, P.R. China;Department of Computer Science, COMSATS Instiutute of Information Technology, Islamabad, Pakistan

  • Venue:
  • ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Mobile Agents (MAs) are not fully adopted for implementing distributed system especially in e-commerce application. The main reason is the security issues associated with use of MAs. Providing integrity of execution is considered as the most challenging problem in MAs. Mobile agent Graph Head Sealing (MAGHS) is a technique that aims towards providing integrity of execution. This paper discusses the attacks that can be launched against MAGHS technique and how the security properties for MAs data integrity are fulfilled. We try to model the behavior of a malicious host by launching a series of passive attacks against mobile agent and then see to what extent the security properties for mobile agent can be achieved. The experimental results suggest that MAGHS framework can be used to protect the computations results of mobile agents.