Protecting free-roaming mobile agent against multiple colluded truncation attacks

Mobile agent environment is one of the emerging technology to reduce the network traffic. Various security issues are identified and protected. Now the new security issue in this environment is the multiple colluded truncation attacks in the Free-roaming mobile agents. This paper proposes the identity verification mechanism to protect the multiple colluded truncation attacks The identification is verified from the beginning dummy offer of the creator of the agent.

[1]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[2]  Suphithat Songsiri A new approach for computation result protection in the mobile agent paradigm , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[3]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[4]  Jianying Zhou,et al.  Protecting free roaming agents against result-truncation attack , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[5]  Lein Harn,et al.  An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[6]  C. Stefanelli,et al.  Mobile agents protection in the Internet environment , 1999, Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032).

[7]  Victor K.-W. Wei,et al.  Defenses against the Truncation of Computation Results of Free-Roaming Agents , 2002, ICICS.

[8]  Volker Roth,et al.  On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection , 2001, Mobile Agents.

[9]  N. Asokan,et al.  Protecting the computation results of free-roaming agents , 1998, Personal Technologies.

[10]  Javier López,et al.  Analysis of a free roaming agent result-truncation defense scheme , 2004, Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004..

[11]  Ed Dawson,et al.  An Improved Forward Integrity Protocol for Mobile Agents , 2003, WISA.