Abstract
Yee [Yee97] and Karjoth, et al. [KAG98] proposed schemes to protect the agent data. Various degrees of forward integrity were achieved by their results, among other benefits. A known vulnerability of their techniques is the truncation attack where two visited hosts (or one revisited host) can collude to discard the partial results collected between their respective visits. In this paper we propose several defenses against the truncation attack and the related growing-a-fake-stem (“stemming”) attack for the protection of the partial computation results of free-roaming agents. In Protocol N1, we use a co-signing technique to prevent the two-colluder truncation attack. Generalizations of N1 can further raise the threshold number of colluding hosts we can defend. Protocol N2 does not prevent truncation or stemming. It detects stemming and identifies the exact pair of colluders for prosecution. Protocol N2 mainly relies on mutual authentication techniques.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
B.S. Yee, “A Sanctuary for Mobile Agents,” Technical Report CS97-537, UC San Diego, Department of Computer Science and Engineering, April 1997.
G. Karjoth, N. Asokan, and C. Gülcü, “Protecting the computation results of free-roaming agents,” Proc. Second International Workshop on Mobile Agents (MA’ 98), K. Rothermel and F. Hohl, editors, LNCS 1477, pp. 195–207, Springer-Verlag, 1998.
S. Loureiro, R. Molva, and A. Pannetrat, “Secure data collection with updates,” In Proceedings of the Workshop on Agents on Electronic Commerce-First Asia Pacific Conference on Inteligent Agent technology, Hong-Kong, December 1999.
V. Roth, “Programming Satan’s agents,” in Proc 1st International Workshop on Secure Mobile Multi-Agent Systems, (Montreal, Canada), May 2001. <URL http://www.dfki.de/kuf/semas/semas-2001/>
V. Roth. “On the robustness of some cryptographic protocols for mobile agent protection,” In Proc. Mobile Agents 2001, LNCS 2240 Springer Verlag, December 2001.
V. Roth. Empowering Mobile Software Agents. Submitted to 6th IEEE Conference on Mobile Agents, Barcelona, Spain, 2002.
T.C. Lam, and V.K. Wei, “A Mobile Agent Clone Detection System with Itinerary Privacy,” 11 th International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE’ 02) 2002.
E. Vijil, S. Iyer, “Identifying Collusions: Co-operating Malicious Hosts in Mobile Agent Itineraries,” in Second International Workshop on Security of Mobile Multiagent Systems, SEMAS’ 02, Italy, July 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cheng, J.S.L., Wei, V.K. (2002). Defenses against the Truncation of Computation Results of Free-Roaming Agents. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_1
Download citation
DOI: https://doi.org/10.1007/3-540-36159-6_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00164-5
Online ISBN: 978-3-540-36159-6
eBook Packages: Springer Book Archive