Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Environmental Key Generation Towards Clueless Agents
Mobile Agents and Security
Policy-based authentication for mobile agents
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Hi-index | 0.00 |
Even though a mobile agent system contributes largely to mobile computing on distributed network environment, it has a number of significant security problems. In this paper, we analyze security attacks to this system presented by NIST[3]. In order to protect it from them, we suggest a security protocol for a mobile agent system by employing Identity-based key distribution and digital multi-signature scheme. To solve these problems described on NIST, securities of mobile agent and agent platform should be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Furthermore, it is designed to guarantee the liveness of agent, and to detect message modification immediately by verifying each step of agent execution.