Skip to main content
Log in

Protecting the computation results of free-roaming agents

  • Published:
Personal Technologies Aims and scope Submit manuscript

Abstract

When mobile agents do comparison shopping for their owners, they are subject to attacks of malicious hosts executing the agents. We present a family of protocols that protect the computation results established by free-roaming mobile agents. Our protocols enable the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent, thus providing forward integrity and truncation resilience. In an environment without public-key infrastructure, the protocols are based only on a secret hash chain. With a public-key infrastructure, the protocols also guarantee non-repudiability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. White JE. Mobile agents. In: Bradshaw J (ed) Software agents. AAAI Press and MIT Press, Cambridge, MA, 1996

    Google Scholar 

  2. Doorenbos B, Etzioni O, Weld D. A scalable comparison-shopping agent for the World Wide Web. In: AGENTS-97, 1997

  3. Chavez A, Maes P. Kasbah: An agent marketplace for buying and selling goods. In: First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, 1996; 75–90

  4. Rus D, Gray R, Kotz D. Transportable information agents. In: Huhns M, Singh M (eds) Readings in Agents. Morgan Kaufmann, 1997.

  5. Vigna G. Protecting mobile agents through tracing. In Third Workshop on Mobile Object Systems, June 1997

  6. Yee BS. A sanctuary for mobile agents. Technical Report CS97-537, University of California at San Diego, Department of Computer Science and Engineering, April 1997

  7. NIST (National Institute of Standards and Technology) Computer Systems Laboratory. Secure hash standard. Federal Information Processing Standards Publication FIPS PUB 180-1, April 1995

  8. Di Caro G, Dorigo M. Mobile agents for adaptive routing. In: 31st Hawaii International Conference on System Science (HICSS-31), Big Island of Hawaii, 6–9 January, 1998

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to G. Karjoth.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Karjoth, G., Asokan, N. & Gülcü, C. Protecting the computation results of free-roaming agents. Personal Technologies 2, 92–99 (1998). https://doi.org/10.1007/BF01324939

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01324939

Keywords

Navigation