Abstract
The security aspect is crucial to the deployment of the mobile agent technology to commercial applications. The main issue is how to prevent the malicious modifications of code and data in the mobile agents, as the mobile agents may travel to different hosts to carry out tasks in an open environment. In this paper, we present a detection mechanism using tracing which provides more efficiency and higher privacy. Moreover, the performance of the protocol is analyzed in this paper. Some optimizations are also suggested to improve the performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Zachary, J.: Protecting Mobile Code in the Wild. Internet Computing 7(2), 78–82 (2003)
Vigna, G.: Protecting Mobile Agents through Tracing. In: Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvalskyla, Finland (1997)
Hohl, F.: A Protocol to Detect Malicious Hosts Attacks by Using Reference States. Technical Report Nr. 09/99, Faculty of Informatics, University of Stuttgart, Germany (1999)
Yu, C.M., Ng, K.W.: A Flexible Tamper-Detection Protocol for Mobile Agents on Open Networks. In: Proceedings of the 2002 International Conference of Information and Knowledge Engineering, USA, pp. 248–254 (2002)
Rhazi, A.E., Pierre, S., Boucheneb, H.: Secure Protocol in Mobile Agent Environment. In: IEEE CCECE (2003)
Sander, T., Tschudin, C.: Protecting Mobile Agents against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)
Funfrocken, S.: Protecting Mobile Web-Commerce Agents with Smartcards. In: Agent Systems and Applications (1999) and Third International Symposium on Mobile Agents. Proceedings, pp. 90–102 (1999)
Marques, P.J., Silva, L.M., Silva, J.G.: Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce. In: Agent Systems and Applications (1999) and Third International Symposium on Mobile Agents. Proceedings, pp. 268–269 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Leung, KK., Ng, KW. (2004). Detection of Malicious Host Attacks by Tracing with Randomly Selected Hosts. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds) Embedded and Ubiquitous Computing. EUC 2004. Lecture Notes in Computer Science, vol 3207. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30121-9_80
Download citation
DOI: https://doi.org/10.1007/978-3-540-30121-9_80
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22906-3
Online ISBN: 978-3-540-30121-9
eBook Packages: Springer Book Archive