Skip to main content

Application of Fiat-Shamir Identification Protocol to Design of a Secure Mobile Agent System

  • Conference paper
Computer and Information Sciences - ISCIS 2003 (ISCIS 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2869))

Included in the following conference series:

  • 522 Accesses

Abstract

Even though an agent system contributes largely to mobile computing on distributed network environment, it has a number of significant security problems. In this paper, we analyze security attacks to this system presented by NIST[3]. In order to protect it from them, we suggest a security protocol for a mobile agent system by employing Identity-based key distribution and digital multi-signature scheme. To solve the problems described on NIST, securities of mobile agent and agent platform should be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mention only one of them. Also, it is designed to guarantee the liveness of agent, and to detect message modification immediately by verifying the execution of agent correctly.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dale, J., Mamdani, E.: Open Standards for Interoperating Agent-Based Systems. Software FOCUS. Wiley (2001)

    Google Scholar 

  2. Poslad, S., Calisti, M.: Towards Improved Trust and Security in FIPA Agent Platforms. In: Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies, Spain (2000)

    Google Scholar 

  3. Jansen, W., Karygiannis, T.: Mobile Agent Security. NIST Special Publication 800–819 (1998)

    Google Scholar 

  4. Vigna, G.: Protecting Mobile Agents through Tracing. In: Tschudin, C.F., Vitek, J. (eds.) MOS 1996. LNCS, vol. 1222. Springer, Heidelberg (1997)

    Google Scholar 

  5. Bennet, S.Y.: A Sanctuary for Mobile Agents. In: DARPA Workshop on Foundations for Secure Mobile Code Workshop, pp. 26–28 (1997)

    Google Scholar 

  6. Baek, J., Lee, D.: Security of Mobile Agent Using Digital Signature and Audit trail. In: Proc. of KISS Fall Conference, KISS, vol. 24(2) (1997)

    Google Scholar 

  7. Hohl, F.: An approach to solve the problem of malicious hosts. Universitat Stuttgart, Fakultat Informatik, Fakultatsbericht Nr. (1997)

    Google Scholar 

  8. Wilhelm, U. G., Stamann, S.: Protecting the Itinerary of Mobile Agents. In: Proc. of the ECOOP Workshop on Distributed Object Security, INRIA, France, pp.135–145 (1998)

    Google Scholar 

  9. Riordan, J., Schneier, B.: Environmental Key Generation towards Clueless Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 15–24. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Ordille, J.: When agents roam, who can you trust? In: Proc. of the First Conference on Emerging Technologies and Applications in Communications, Porland (May 1996)

    Google Scholar 

  11. Shamir, A.: Identity-based cryptosystem and signature scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–57. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  12. Kim, S., Won, D.: A Study on the Special Digital Signature Systems. KIISC 6(2), 21–32 (1996)

    Google Scholar 

  13. Gang, C.: A study on the digital multisignature scheme and applications. Ph.D. dissertation, Chungnam National Univ., Taejon, Korea (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, S., Lee, O., Lee, Y., Bae, Y., Chung, I. (2003). Application of Fiat-Shamir Identification Protocol to Design of a Secure Mobile Agent System. In: Yazıcı, A., Şener, C. (eds) Computer and Information Sciences - ISCIS 2003. ISCIS 2003. Lecture Notes in Computer Science, vol 2869. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39737-3_95

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39737-3_95

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20409-1

  • Online ISBN: 978-3-540-39737-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics