Skip to main content
placeholder image

Secure mobile agents with controlled resources

Journal Article


Abstract


  • Mobile agents often travel in a hostile environment where their security and privacy could be compromised by any party including remote hosts in which agents visit and get services. It is believed that the host visited by an agent should jointly sign a service agreement with the agent’s owner; hence a proxy-signing model was proposed in the literature, allowing every host in the agent system to sign a service agreement. We observe that this actually poses a serious problem whereby a host that should be excluded from an

    underlying agent network could also send a signed service agreement. In order to solve this problem, we propose two schemes achieving host authentication with controlled resources, where only selected hosts can be included in the agent network. We provide two schemes in this paper. The second scheme offers a smaller data size. We also define security models and provide rigorous security proofs to our schemes.

UOW Authors


  •   Zhang, Qi (external author)
  •   Mu, Yi (external author)
  •   Zhang, Minjie
  •   Deng, Robert H. (external author)

Publication Date


  • 2011

Citation


  • Zhang, Q., Mu, Y., Zhang, M. & Deng, R. H. (2011). Secure mobile agents with controlled resources. Concurrency and Computation: Practice and Experience, 23 (12), 1348-1366.

Scopus Eid


  • 2-s2.0-80051496798

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3562

Number Of Pages


  • 18

Start Page


  • 1348

End Page


  • 1366

Volume


  • 23

Issue


  • 12

Abstract


  • Mobile agents often travel in a hostile environment where their security and privacy could be compromised by any party including remote hosts in which agents visit and get services. It is believed that the host visited by an agent should jointly sign a service agreement with the agent’s owner; hence a proxy-signing model was proposed in the literature, allowing every host in the agent system to sign a service agreement. We observe that this actually poses a serious problem whereby a host that should be excluded from an

    underlying agent network could also send a signed service agreement. In order to solve this problem, we propose two schemes achieving host authentication with controlled resources, where only selected hosts can be included in the agent network. We provide two schemes in this paper. The second scheme offers a smaller data size. We also define security models and provide rigorous security proofs to our schemes.

UOW Authors


  •   Zhang, Qi (external author)
  •   Mu, Yi (external author)
  •   Zhang, Minjie
  •   Deng, Robert H. (external author)

Publication Date


  • 2011

Citation


  • Zhang, Q., Mu, Y., Zhang, M. & Deng, R. H. (2011). Secure mobile agents with controlled resources. Concurrency and Computation: Practice and Experience, 23 (12), 1348-1366.

Scopus Eid


  • 2-s2.0-80051496798

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3562

Number Of Pages


  • 18

Start Page


  • 1348

End Page


  • 1366

Volume


  • 23

Issue


  • 12