Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent

Technologies and their applications related to e-commerce have always been the topic of interests to attract researchers and widely discussed. Among them, the use of the mobile agent in e-commerce is a highly potential technology which has accumulated a lot of interests in recent years. Since the mobile agent has high autonomy and mobility, it can move, unbridled, in different execution environments. At the same time, it can automatically detect its current environment and respond accordingly. Finally, it can also carry out work, or tasks assigned to it by its user. The above qualities make the mobile agent very suitable for use in e-commerce. The internet is an open environment. When there is a need to transfer, or exchange confidential information over the internet, the security of the present Internet environment must be improved. Even so, during its execution, a mobile agent needs to roam around the internet between different servers on the internet. At the same time, a mobile agent may also come in contact, or interact with other mobile agents or hosts. Therefore, the users may worry that a mobile agent may not work properly if it meets with a malicious program, or if it is tampered with by a malicious host, or that confidential information carried by the mobile agent may be stolen by other agents. To ensure the safety of mobile agents on the internet, this paper proposes a security scheme suitable for use to mobile agents: The scheme includes access control and key management to ensure the security and confidentiality of information and the system. In view of the access control and key management scheme for mobile agents proposed by Volker and Mehrdad[l], this paper proposes a new scheme that uses the concepts of polynomial interpolation formula[19], the hierarchy structure and the superkey[8] to improve the previous security schemes which need a large amount of space for the mobile agent. According to this paper's security and performance analysis, it is proved that the proposed scheme can efficiently protect the mobile agents.

[1]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[2]  Fritz Hohl A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.

[3]  Ahmed Karmouch Mobile Software Agents for Telecommunications , 1998, IEEE Communications Magazine.

[4]  Niklas Borselius Mobile agent security , 2002 .

[5]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[6]  Min-Shiang Hwang An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy , 1999 .

[7]  Min-Shiang Hwang An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies , 2000, Int. J. Comput. Math..

[8]  Antonio Corradi,et al.  Security issues in mobile agent technology , 1999, Proceedings 7th IEEE Workshop on Future Trends of Distributed Computing Systems.

[9]  E. Rabinovitch,et al.  The language Of The Internet , 1998, IEEE Communications Magazine.

[10]  Volker Roth,et al.  Access control and key management for mobile agents , 1998, Comput. Graph..

[11]  Min-Shiang Hwang,et al.  A Dynamic Key Generation Scheme for Access Control in a Hierarchy , 1999, Nord. J. Comput..

[12]  Min-Shiang Hwang Extension of CHW cryptographic key assignment scheme in a hierarchy , 1999 .

[13]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[14]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[15]  Donald E. Knuth,et al.  The art of computer programming. Vol.2: Seminumerical algorithms , 1981 .

[16]  Pattie Maes,et al.  Agents that buy and sell , 1999, CACM.

[17]  Min-Shiang Hwang,et al.  An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy , 1999 .

[18]  Min-Shiang Hwang Cryptanalysis of YCN key assignment scheme in a hierarchy , 2000, Inf. Process. Lett..

[19]  Anand R. Tripathi,et al.  A security architecture for mobile agents in Ajanta , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[20]  Min-Shiang Hwang,et al.  Efficient access control and key management schemes for mobile agents , 2004, Comput. Stand. Interfaces.