Approaching Secure Communications in a Message-Oriented Mobile Computing Environment

The Personal Mobility Management System (PMMS), an agent-based message-oriented mobile computing application developed at Multimedia and Mobile Agent Research Laboratory, aims to provide personalized services and resources access to its nomadic users within a virtual network across different organizations. This paper analyses and discusses the security weaknesses exposed in the system architecture, then proposes several security frameworks to overcoming these security concerns. The paper tries to address and provide a general architectural solution to ensure secure communications for a typical message-oriented mobile computing system.

[1]  Ronald L. Rivest,et al.  The MD4 Message-Digest Algorithm , 1990, RFC.

[2]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[3]  Jan Vitek,et al.  Mobile object systems : towards the programmable internet : Second International Workshop, MOS '96, Linz, Austria, July 8-9, 1996 : selected presentations and invited papers , 1997 .

[4]  P. Metzger,et al.  Network Working Group , 2000 .

[5]  Otto Spaniol,et al.  Impacts of mobility on telecommunication and data communication networks , 1995, IEEE Wirel. Commun..

[6]  Scott Oaks,et al.  Java Security , 1998 .

[7]  Jan Vitek,et al.  Security and Communication in Mobile Object Systems , 1996, Mobile Object Systems.

[8]  Jeffrey M. Bradshaw,et al.  Software agents , 1997 .

[9]  Timothy W. Finin,et al.  KQML as an agent communication language , 1994, CIKM '94.

[10]  Rolf Oppliger,et al.  Authentication systems for secure networks , 1996 .

[11]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[12]  Walter Tuchman,et al.  IV. `Hellman presents no shortcut solutions to the DES¿ , 1979, IEEE Spectrum.

[13]  Robert S. MacGregor,et al.  WWW Security: How to Build a Secure World Wide Web Connection , 1996 .

[14]  Tim Howes,et al.  Lightweight Directory Access Protocol , 1995, RFC.

[15]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[16]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .