Skip to main content
Log in

Approaching Secure Communications in a Message-Oriented Mobile Computing Environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The Personal Mobility Management System (PMMS), an agent-based message-oriented mobile computing application developed at Multimedia and Mobile Agent Research Laboratory, aims to provide personalized services and resources access to its nomadic users within a virtual network across different organizations. This paper analyses and discusses the security weaknesses exposed in the system architecture, then proposes several security frameworks to overcoming these security concerns. The paper tries to address and provide a general architectural solution to ensure secure communications for a typical message-oriented mobile computing system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. ANSI X3.92, American National Standard for Data Encryption Algorithm (DEA), American National Standards Institute, 1981.

  2. J. Bradsahaw, Software Agents, AAAI Press/The MIT Press, Cambridge, MA, 1997.

    Google Scholar 

  3. D.E. Denning, Cryptography and Data Security, Addison-Wesley Publishing Company, Reading, MA, 1982.

    Google Scholar 

  4. A. Hooda, A. Karmouch, and S. Abu-Hakima, “Nomadic support using agents,” in 4th International Symposium on Internetworking, Ottawa, July 1998.

  5. http://www.Mitel.com, “The MicMac softwareTestbed,”Technical Report, Mitel-CATA, Kanata, ON, Canada, 1996.

  6. Y. Labrou, J. Mayfield, and T. Finin, “KQML as an agent communication language,” in Proceedings of the 3rd International Conference on Information and Knowledge Management (CIKM'94), ACM Press, New York, NY, Nov. 1994.

    Google Scholar 

  7. R.S. Macgregor, A. Arest, and A. Siegert, WWW Security—How to Build a Secure World Wide Web Connection, Prentice Hall, Upper Saddle River, NJ, 1996.

    Google Scholar 

  8. National Institute of Standards and Technology, NIST FIPS PUB 186, Digital Signature Standard, U.S. Department of Commerce, May 1994.

  9. Network Working Group, Lightweight Directory Access Protocol (v3), RFC 2251, IETF, Dec. 1997.

  10. S. Oaks, Java Security, O'Reilly & Associates, Sebastopd, CA, May 1998.

    Google Scholar 

  11. R. Oppliger, Authentication System for Secure Networks, Artech House INC, Boston, MA, 1996.

    Google Scholar 

  12. R.L. Rivest, The MD4 Message Digest Algorithm, RFC 1320, April 1992.

  13. R.L. Rivest, The MD5 Message Digest Algorithm, RFC 1321, April 1992.

  14. R.L. Rivest, A. Shamir, and L.M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120–126, Feb. 1978.

    Google Scholar 

  15. B. Schneier, Applied Cryptography, second edition, John Wiley & Sons, New York, NY, Dec. 1995.

    Google Scholar 

  16. G.J. Simmons, Contemporary Cryptology—The Science of Information Integrity, IEEE Press, Piscataway, NJ, 1992.

    Google Scholar 

  17. O. Spaniol, A. Fasbender, S. Hoff, J. Kaltwasser, and J. Kassubek, “Impacts of mobility on telecommunication and data communication networks,” IEEE Personal Communications, Oct. 1995.

  18. W. Tuchman, “Hellman presents no shortcut solutions to DES,” IEEE Spectrum, Vol. 16, No. 7, pp. 40–41, July 1979.

    Google Scholar 

  19. J. Vitek, “Security and communication in mobile object systems,” in Mobile Object Systems: Towards The Programmable Internet: Second International Workshop, MOS' 96, Linz, Austria, July 8–9, 1996: Selected Presentations and Invited Papers, Springer: New York, 1997, pp. 177–200.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cui, Z., Karmouch, A., Impey, R. et al. Approaching Secure Communications in a Message-Oriented Mobile Computing Environment. Multimedia Tools and Applications 13, 147–163 (2001). https://doi.org/10.1023/A:1009637126236

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1009637126236

Navigation