Skip to main content

A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5060))

Abstract

Security and anonymity are vital for free-roaming mobile agent-based applications. Based on anonymous onion routing, this paper proposes a security protocol to defend truncation attacks for free-roaming mobile agent-based applications. This protocol uses “two hops forwards and k anonymous hops backwards” chain relation to implement the generally accepted mobile agent security properties. Security analysis proves that this protocol can defend known attacks, especially multiple colluded truncation attacks and provide privacy protection to previously visited servers. Performance evaluation shows this protocol requires limited communication overhead if right parameters are chosen.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karjoth, G., Asokan, N., Gülcü, C.: Protecting the computation results of free-roaming agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 195–207. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  2. Karnik, N.M., Tripathi, A.R.: Security in the Ajanta Mobile Agent System. Technical Report TR-5-99, University of Minnesota, Minneapolis, MN 55455, USA (1999)

    Google Scholar 

  3. Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents Protection in the Internet Environment. In: 23rd Annual International Computer Software and Applications Conference (COMPSAC 1999), Phoenix, AZ, USA, pp. 80–85 (1999)

    Google Scholar 

  4. Xu, D., Harn, L., Narasimhan, M., Luo, J.: An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks. In: 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), Chicago, USA, pp. 309–314 (2006)

    Google Scholar 

  5. Cheng, J., Wei, V.: Defenses against the truncation of computation results of free-roaming agents. In: 4th International Conference on Information and Communications Security, Singapore, pp. 1–12 (2002)

    Google Scholar 

  6. Yao, M., Foo, E., Dawson, E.P., Peng, K.: An Improved Forward Integrity Protocol for Mobile Agents. In: 4th International Workshop on Information Security Applications (WISA 2003, Jeju Island, Korea, pp. 272–285 (2003)

    Google Scholar 

  7. Songsiri, S.: A New Approach for Computation Result Protection in the Mobile Agent Paradigm. In: 10th IEEE Symposium on Computers and Communications (ISCC 2005), Cartagena, Spain, pp. 575–581 (2005)

    Google Scholar 

  8. Zhou, J., Onieva, J., Lopez, J.: Protecting Free Roaming Agents against Result-Truncation Attack. In: 60th IEEE Vehicular Technology Conference, Los Angles, USA, pp. 3271–3274 (2004)

    Google Scholar 

  9. Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE Journal Selected Areas in Communications 16(4), 482–494 (1998)

    Article  Google Scholar 

  10. Gomez-Martinez, E., IIarri, S., Merseguer, J.: Performance analysis of mobile agents tracking. In: 6th international workshop on Software and performance, Buenes Aires, Argentina, pp. 181–188 (2007)

    Google Scholar 

  11. Chmiel, K., Gawinecki, M., Kaczmarek, P., Szymczak, M., Paprzycki, M.: Efficiency of JADE agent platform. Scientific Programming 13(2), 159–172 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Chunming Rong Martin Gilje Jaatun Frode Eika Sandnes Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, X., Xu, D., Luo, J. (2008). A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69295-9_47

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69294-2

  • Online ISBN: 978-3-540-69295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics