Skip to main content

Lightweight Mobile Agent Authentication Scheme for Home Network Environments

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3314))

Abstract

Recently, interests on the home network, that requires new services and new computing paradigms, have enormously been increased. Applying the mobile agent to the home network is expected to provide a new computing model. The mobile agent authentication is a preceding technology to apply the mobile agent concept to the home network environments. The existing public key based authentication scheme is not suitable to the home network devices which has the limited computation capability. In this paper, we propose a lightweight mobile agent authentication scheme based on the shared key and public key infrastructures.

This work was supported by National Center of Excellence in Ubiquitous Computing and Networking (CUCN), Korea.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rose, B.: Home Networks: A Standard Perspective. IEEE Communication Magazine, pp. 78–85 (2001)

    Google Scholar 

  2. Karnik, N.M., Tripathi, A.R.: Agent Server Architecture for the Mobile-Agent System. In: PDPTA 1998, July 1998, pp. 66–73 (1998)

    Google Scholar 

  3. Yoo, J.J., Lee, D.I.: Scalable Home Network Interaction Model Based on Mobile Agents. In: PerCom 2003, March 2003, pp. 543–546 (2003)

    Google Scholar 

  4. Karnik, N.: Security in Mobile Agent Systems, Ph. D. dissertation, University of Minnesota (1998)

    Google Scholar 

  5. ObjectSpace Inc.: Voyager Security Developer’s Guide Table of Contents, http://www.recursionsw.com/products/voyager/voyager.asp

  6. Berkovits, S., Guttman, J.D., Swarup, V.: Authentication for Mobile Agents. In: Mobile Agents and Security. LNCS, pp. 114–136 (1998)

    Google Scholar 

  7. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. In: ACM Transactions on Computersystems, pp. 265–310 (November 1992)

    Google Scholar 

  8. Ellison, C.: UPnP Security Ceremonies Design Document. Intel Corporation (October 2003)

    Google Scholar 

  9. Sun Microsystems Inc.: AR - JiniTM Architecture Specification, http://www.jini.org

  10. HAVi Inc.: HAVi, the A/V digital network revolution (May 2001), http://www.havi.org

  11. Gudgin, M., Hadley, M., Mendelsohn, N., Moreau, J., Nielsen, H.: SOAP Version 1.2 (June 2003), http://www.w3.org/TR/soap/

  12. Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering (January 1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, Jg., Kim, G.S., Eom, Y.I. (2004). Lightweight Mobile Agent Authentication Scheme for Home Network Environments. In: Zhang, J., He, JH., Fu, Y. (eds) Computational and Information Science. CIS 2004. Lecture Notes in Computer Science, vol 3314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30497-5_132

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30497-5_132

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24127-0

  • Online ISBN: 978-3-540-30497-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics