Distributed lightweight Kerberos protocol for Mobile Agent Systems

This paper focuses on an efficient technology for implementing a Mobile Agent System (MAS). The mobile agent is able to hold consumers' requests, migrates between platforms and executes its code autonomously. The agent is required to return results to its owner, so he or she can make the right decisions. Kerberos protocol is one of the best known authentication protocols based on symmetric key. Kerberos is a trusted third-party authentication protocol designed to establish network security. In this paper, we propose a new protocol that is based on enhancements modification of Kerberos and is suited to provide confidentiality, integrity, authentication and authorization. A security analysis of the new protocol is also provided.

[1]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[2]  Abhinav Sarje,et al.  A route secure parallel dispatch model for mobile agents security , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[3]  Yi Mu,et al.  Secure Mobile Agents with Designated Hosts , 2009, 2009 Third International Conference on Network and System Security.

[4]  Jeffrey J. P. Tsai,et al.  Formal Modeling and Analysis of a Secure Mobile-Agent System , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[5]  Qiang Tong,et al.  A Security Technology for Mobile Agent System Improved by Trusted Computing Platform , 2009, 2009 Ninth International Conference on Hybrid Intelligent Systems.

[6]  Moti Yung,et al.  Scalability and flexibility in authentication services: the KryptoKnight approach , 1997, Proceedings of INFOCOM '97.

[7]  Chan Yeob Yeun,et al.  Security for emerging ubiquitous networks , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..