Skip to main content

Defenses against the Truncation of Computation Results of Free-Roaming Agents

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Abstract

Yee [Yee97] and Karjoth, et al. [KAG98] proposed schemes to protect the agent data. Various degrees of forward integrity were achieved by their results, among other benefits. A known vulnerability of their techniques is the truncation attack where two visited hosts (or one revisited host) can collude to discard the partial results collected between their respective visits. In this paper we propose several defenses against the truncation attack and the related growing-a-fake-stem (“stemming”) attack for the protection of the partial computation results of free-roaming agents. In Protocol N1, we use a co-signing technique to prevent the two-colluder truncation attack. Generalizations of N1 can further raise the threshold number of colluding hosts we can defend. Protocol N2 does not prevent truncation or stemming. It detects stemming and identifies the exact pair of colluders for prosecution. Protocol N2 mainly relies on mutual authentication techniques.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. B.S. Yee, “A Sanctuary for Mobile Agents,” Technical Report CS97-537, UC San Diego, Department of Computer Science and Engineering, April 1997.

    Google Scholar 

  2. G. Karjoth, N. Asokan, and C. Gülcü, “Protecting the computation results of free-roaming agents,” Proc. Second International Workshop on Mobile Agents (MA’ 98), K. Rothermel and F. Hohl, editors, LNCS 1477, pp. 195–207, Springer-Verlag, 1998.

    Google Scholar 

  3. S. Loureiro, R. Molva, and A. Pannetrat, “Secure data collection with updates,” In Proceedings of the Workshop on Agents on Electronic Commerce-First Asia Pacific Conference on Inteligent Agent technology, Hong-Kong, December 1999.

    Google Scholar 

  4. V. Roth, “Programming Satan’s agents,” in Proc 1st International Workshop on Secure Mobile Multi-Agent Systems, (Montreal, Canada), May 2001. <URL http://www.dfki.de/kuf/semas/semas-2001/>

  5. V. Roth. “On the robustness of some cryptographic protocols for mobile agent protection,” In Proc. Mobile Agents 2001, LNCS 2240 Springer Verlag, December 2001.

    Google Scholar 

  6. V. Roth. Empowering Mobile Software Agents. Submitted to 6th IEEE Conference on Mobile Agents, Barcelona, Spain, 2002.

    Google Scholar 

  7. T.C. Lam, and V.K. Wei, “A Mobile Agent Clone Detection System with Itinerary Privacy,” 11 th International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’ 02) 2002.

    Google Scholar 

  8. E. Vijil, S. Iyer, “Identifying Collusions: Co-operating Malicious Hosts in Mobile Agent Itineraries,” in Second International Workshop on Security of Mobile Multiagent Systems, SEMAS’ 02, Italy, July 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cheng, J.S.L., Wei, V.K. (2002). Defenses against the Truncation of Computation Results of Free-Roaming Agents. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics