Abstract
This paper describes an application of cryptographic mobile agents to implement a simple Digital Rights Management (DRM) scheme. The scheme is designed upon a combination of mobile clueless agents, a threshold scheme and one-time passwords. The main goal of the scheme was to make it secure yet lightweight and easy to deploy and to maintain. The scheme is derived from Open Mobile Alliance’s DRM system, which is a leading DRM standard for mobile devices. We describe here the architecture and the implementation of the scheme together with the results of the experiments. The reference implementation was done in Java and tested on JADE agent platform. The experiments were conducted on a distributed system consisting of various machines running different operating systems. We measured the performance of the proposed scheme to assess its usability for real-life applications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Open Mobile Alliance: OMA DRM Specification. Candidate version 2.0 (2005)
Onieva, J., Lopez, J., et al.: Extending an OMA-based DRM Framework with Non-repudiation Services. In: Proceedings of the 5th IEEE Symposium on Signal Processing and Information Technology, pp. 472–477. IEEE Computer Society, Los Alamitos (2005)
Zheng, Y., He, D., et al.: Secure DRM Scheme for Future Mobile Networks Based on Trusted Mobile Platform. In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WCNM 2005). IEEE Press, Los Alamitos (2005)
Koenen, R., Lacy, J., et al.: The Long March to Interoperable Digital Rights Management. Proceedings of the IEEE 92(6), 883–897 (2004)
Ziółkowski, B., Stokłosa, J.: Mobile Agent-based Digital Rights Management Scheme. In: Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM 2007), IEEE Conference Proceedings, pp. 213–218. IEEE Computer Society, Los Alamitos (2007)
Riordan, J., Schneier, B.: Environmental Key Generation Towards Clueless Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 15–24. Springer, Heidelberg (1998)
Menezes, A., van Oorschot, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Ziółkowski, B., Stokłosa, J.: A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol. In: Kowalik, J., Górski, J., Sachenko, A. (eds.) Cyberspace Security and Defense: Research Issues. NATO Science Series, vol. 196, pp. 331–345. Springer, Heidelberg (2005)
Karnin, E., Green, J., Hellman, M.: On Secret Sharing Systems. IEEE Transactions on Information Theory IT-29, 35–41 (1983)
Haller, N.M.: The S/Key One-Time Password System. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 151–157. IEEE Press, Los Alamitos (1994)
Wang, X., Yin, Y., et al.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)
Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent System (AAMAS 2006), pp. 1116–1118. ACM, New York (2006)
Bürkle, A., Essendorfer, B., et al.: A Test Suite for the Evaluation of Mobile Agent Platform Security. In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2006), pp. 752–756. IEEE Computer Society, Los Alamitos (2006)
Chmiel, K., Tomiak, D., et al.: Testing the Efficiency of JADE Agent Platform. In: ISPDC 2004: Proceedings of the Third International Symposium on Parallel and Distributed Computing/Third International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks, pp. 49–56. IEEE Computer Society, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ziółkowski, B., Stokłosa, J. (2010). Mobile Agent-Based Digital Rights Management Scheme Implementation. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds) Networked Digital Technologies. NDT 2010. Communications in Computer and Information Science, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14306-9_49
Download citation
DOI: https://doi.org/10.1007/978-3-642-14306-9_49
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14305-2
Online ISBN: 978-3-642-14306-9
eBook Packages: Computer ScienceComputer Science (R0)