Abstract
Recently, interests on the home network, that requires new services and new computing paradigms, have enormously been increased. Applying the mobile agent to the home network is expected to provide a new computing model. The mobile agent authentication is a preceding technology to apply the mobile agent concept to the home network environments. The existing public key based authentication scheme is not suitable to the home network devices which has the limited computation capability. In this paper, we propose a lightweight mobile agent authentication scheme based on the shared key and public key infrastructures.
This work was supported by National Center of Excellence in Ubiquitous Computing and Networking (CUCN), Korea.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Rose, B.: Home Networks: A Standard Perspective. IEEE Communication Magazine, pp. 78–85 (2001)
Karnik, N.M., Tripathi, A.R.: Agent Server Architecture for the Mobile-Agent System. In: PDPTA 1998, July 1998, pp. 66–73 (1998)
Yoo, J.J., Lee, D.I.: Scalable Home Network Interaction Model Based on Mobile Agents. In: PerCom 2003, March 2003, pp. 543–546 (2003)
Karnik, N.: Security in Mobile Agent Systems, Ph. D. dissertation, University of Minnesota (1998)
ObjectSpace Inc.: Voyager Security Developer’s Guide Table of Contents, http://www.recursionsw.com/products/voyager/voyager.asp
Berkovits, S., Guttman, J.D., Swarup, V.: Authentication for Mobile Agents. In: Mobile Agents and Security. LNCS, pp. 114–136 (1998)
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. In: ACM Transactions on Computersystems, pp. 265–310 (November 1992)
Ellison, C.: UPnP Security Ceremonies Design Document. Intel Corporation (October 2003)
Sun Microsystems Inc.: AR - JiniTM Architecture Specification, http://www.jini.org
HAVi Inc.: HAVi, the A/V digital network revolution (May 2001), http://www.havi.org
Gudgin, M., Hadley, M., Mendelsohn, N., Moreau, J., Nielsen, H.: SOAP Version 1.2 (June 2003), http://www.w3.org/TR/soap/
Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering (January 1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, Jg., Kim, G.S., Eom, Y.I. (2004). Lightweight Mobile Agent Authentication Scheme for Home Network Environments. In: Zhang, J., He, JH., Fu, Y. (eds) Computational and Information Science. CIS 2004. Lecture Notes in Computer Science, vol 3314. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30497-5_132
Download citation
DOI: https://doi.org/10.1007/978-3-540-30497-5_132
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24127-0
Online ISBN: 978-3-540-30497-5
eBook Packages: Computer ScienceComputer Science (R0)