The Role of Secret Sharing in the Distributed MARE Protocols

In a mobile agent based distributed system, agents must survive malicious failures of the hosts they visit, and they must be resilient to the potentially hostile actions of other hosts. The replication and voting are necessary to survive malicious behavior by visited hosts. However, faulty hosts that are not visited by agents can confound a naive replica management scheme by spoofing. This problem can be solved by cryptographic protocols. This paper describes the role of cryptographic methods in the protocols for the MARE architecture, which is a fault-tolerant mobile agent replication system. In this system, secret sharing takes on an important role in facilitating mobile processes by distributed authentication.

[1]  Dejan S. Milojicic,et al.  Trend Wars - Mobile agent applications , 1999, IEEE Concurrency.

[2]  Markus Straßer,et al.  Reliability Concepts for Mobile Agents , 1998, Int. J. Cooperative Inf. Syst..

[3]  Holger Pals,et al.  FANTOMAS: Fault Tolerance for Mobile Agents in Clusters , 2000, IPDPS Workshops.

[4]  André Schiper,et al.  FATOMAS-a fault-tolerant mobile agent system based on the agent-dependent approach , 2001, 2001 International Conference on Dependable Systems and Networks.

[5]  Ran Canetti,et al.  Fast asynchronous Byzantine agreement with optimal resilience , 1993, STOC.

[6]  Clifford A. Lynch,et al.  Information Networking , 1994 .

[7]  Fred B. Schneider,et al.  Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.

[8]  Prithviraj Dasgupta A Fault Tolerance Mechanism for MAgNet: A Mobile Agent based E-commerce System , 2002, International Conference on Internet Computing.

[9]  Matthew K. Franklin,et al.  The Design and Implementation of a Secure Auction Service , 1996, IEEE Trans. Software Eng..

[10]  Stanisław Jarecki,et al.  Proactive secret sharing and public key cryptosystems , 1995 .

[11]  Arun K. Sood,et al.  MARE: A Fault-Tolerant Mobile Agent System , 2004, ICOIN.

[12]  Michael B. Dillencourt,et al.  An application-transparent, platform-independent approach to rollback-recovery for mobile agent systems , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[13]  David Kotz,et al.  Mobile agents and the future of the internet , 1999, OPSR.

[14]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[15]  Adi Shamir,et al.  How to share a secret , 1979, CACM.