Mobile agents integrity for electronic commerce applications
Information Systems - Special issue on information systems support for electronic commerce
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Mobile Search for a Black Hole in an Anonymous Ring
DISC '01 Proceedings of the 15th International Conference on Distributed Computing
Protecting a Mobile Agent's Route against Collusions
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Adaptive Migration Strategy for Mobile Agents on Internet
TES '01 Proceedings of the Second International Workshop on Technologies for E-Services
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
Hi-index | 0.00 |
In the world of mobile agents, security aspects are extensively being discussed. In this context, denial of service attacks are of considerable interest. Here, we consider a special kind of denial of service attacks which focuses on malicious hosts that either delete received agents or prevent them from continuing their route. In general, the prevention of such attacks is not possible. This paper discusses a detection method for a posteriori identification of such malicious hosts. The output of this identification method can be used by agent owners to avoid contacting these hosts again in the future. Moreover, hosts originally intended to be visited cannot be skipped as a result of one malicious host's misbehavior. We provide solutions to this problem for both the cases of completely dependent and completely independent agent computations.