Skip to main content

Protecting the computation results of free-roaming agents

  • Conference paper
  • First Online:
Mobile Agents (MA 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1477))

Included in the following conference series:

Abstract

When mobile agents do comparison shopping for their owners, they are subject to attacks of malicious hosts executing the agents. We present a family of protocols that protect the computation results established by free-roaming mobile agents. Our protocols enable the owner of the agent to detect upon its return whether a visited host has maliciously altered the state of the agent, thus providing forward integrity and truncation resilience. In an environment without public-key infrastructure, the protocols are based only on a secret hash chain. With a public-key infrastructure, the protocols also guarantee non-repudiability.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. A. Chavez and P. Maes. Kasbah: An agent marketplace for buying and selling goods. In First International Conference on the Practical Application of Intelligent Agents and Multi-Agent Technology, pages 75–90, 1996.

    Google Scholar 

  2. G. Di Caro and M. Dorigo. Mobile agents for adaptive routing. In 31st Hawaii International Conference on System Science (HICSS-31), Big Island of Hawaii, January 6–9,1998.

    Google Scholar 

  3. B. Doorenbos, O. Etzioni, and D. Weld. A scalable comparison-shopping agent for the world-wide web. In AGENTS-97, 1997.

    Google Scholar 

  4. NIST National Institute of Standards and Technology (Computer Systems Laboratory). Secure hash standard. Federal Information Processing Standards Publication FIPS PUB 180-1, April 1995.

    Google Scholar 

  5. D. Rus, R. Gray, and D. Kotz. Transportable information agents. In M. Huhns and M. Singh, editors, Readings in Agents. Morgan Kaufmann Publishers, 1997.

    Google Scholar 

  6. G. Tsudik. Personal communication.

    Google Scholar 

  7. G. Vigna. Protecting mobile agents through tracing. In Third Workshop on Mobile Object Systems, June 1997.

    Google Scholar 

  8. J.E. White. Mobile agents. In J. Bradshaw, editor, Software Agents. AAAI Press and MIT Press, 1996.

    Google Scholar 

  9. B.S. Yee. A sanctuary for mobile agents. Technical Report CS97-537, UC San Diego, Department of Computer Science and Engineering, April 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kurt Rothermel Fritz Hohl

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karjoth, G., Asokan, N., Gülcü, C. (1998). Protecting the computation results of free-roaming agents. In: Rothermel, K., Hohl, F. (eds) Mobile Agents. MA 1998. Lecture Notes in Computer Science, vol 1477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0057659

Download citation

  • DOI: https://doi.org/10.1007/BFb0057659

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64959-5

  • Online ISBN: 978-3-540-49817-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics