Protecting mobile agent loops

  • Authors:
  • J. Cucurull;J. Ametller;J. A. Ortega-Ruiz;S. Robles;J. Borrell

  • Affiliations:
  • Department of Information and Communications Engineering, Autonomous University of Barcelona, Bellaterra, Spain;Department of Information and Communications Engineering, Autonomous University of Barcelona, Bellaterra, Spain;Department of Information and Communications Engineering, Autonomous University of Barcelona, Bellaterra, Spain;Department of Information and Communications Engineering, Autonomous University of Barcelona, Bellaterra, Spain;Department of Information and Communications Engineering, Autonomous University of Barcelona, Bellaterra, Spain

  • Venue:
  • MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

A mobile agent's itinerary describes the set of hosts visited during the agent's travel, and must be protected against malicious entities trying to access and/or modify it for their own benefit. Protection mechanisms must be put in place, but we should avoid imposing unnecessary limitations on the agent's ability to choose its itinerary in an as flexible as possible way. In this article, we extend previous work on itinerary protection protocols to include loops among the allowable protected itineraries for roaming agents. Our agents can thus traverse a whole new range of paths in a secure way.