Abstract
Even though an agent system contributes largely to mobile computing on distributed network environment, it has a number of significant security problems. In this paper, we analyze security attacks to this system presented by NIST[3]. In order to protect it from them, we suggest a security protocol for a mobile agent system by employing Identity-based key distribution and digital multi-signature scheme. To solve the problems described on NIST, securities of mobile agent and agent platform should be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mention only one of them. Also, it is designed to guarantee the liveness of agent, and to detect message modification immediately by verifying the execution of agent correctly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dale, J., Mamdani, E.: Open Standards for Interoperating Agent-Based Systems. Software FOCUS. Wiley (2001)
Poslad, S., Calisti, M.: Towards Improved Trust and Security in FIPA Agent Platforms. In: Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies, Spain (2000)
Jansen, W., Karygiannis, T.: Mobile Agent Security. NIST Special Publication 800–819 (1998)
Vigna, G.: Protecting Mobile Agents through Tracing. In: Tschudin, C.F., Vitek, J. (eds.) MOS 1996. LNCS, vol. 1222. Springer, Heidelberg (1997)
Bennet, S.Y.: A Sanctuary for Mobile Agents. In: DARPA Workshop on Foundations for Secure Mobile Code Workshop, pp. 26–28 (1997)
Baek, J., Lee, D.: Security of Mobile Agent Using Digital Signature and Audit trail. In: Proc. of KISS Fall Conference, KISS, vol. 24(2) (1997)
Hohl, F.: An approach to solve the problem of malicious hosts. Universitat Stuttgart, Fakultat Informatik, Fakultatsbericht Nr. (1997)
Wilhelm, U. G., Stamann, S.: Protecting the Itinerary of Mobile Agents. In: Proc. of the ECOOP Workshop on Distributed Object Security, INRIA, France, pp.135–145 (1998)
Riordan, J., Schneier, B.: Environmental Key Generation towards Clueless Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 15–24. Springer, Heidelberg (1998)
Ordille, J.: When agents roam, who can you trust? In: Proc. of the First Conference on Emerging Technologies and Applications in Communications, Porland (May 1996)
Shamir, A.: Identity-based cryptosystem and signature scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–57. Springer, Heidelberg (1985)
Kim, S., Won, D.: A Study on the Special Digital Signature Systems. KIISC 6(2), 21–32 (1996)
Gang, C.: A study on the digital multisignature scheme and applications. Ph.D. dissertation, Chungnam National Univ., Taejon, Korea (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, S., Lee, O., Lee, Y., Bae, Y., Chung, I. (2003). Application of Fiat-Shamir Identification Protocol to Design of a Secure Mobile Agent System. In: Yazıcı, A., Şener, C. (eds) Computer and Information Sciences - ISCIS 2003. ISCIS 2003. Lecture Notes in Computer Science, vol 2869. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39737-3_95
Download citation
DOI: https://doi.org/10.1007/978-3-540-39737-3_95
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20409-1
Online ISBN: 978-3-540-39737-3
eBook Packages: Springer Book Archive