Adaptation of agent-based non-repudiation protocol to mobile digital right management (DRM)

Non-repudiation of a mobile digital rights management (DRM) ensures that when a user (U) sends some message to a rights issuer (RI), neither U nor RI can deny having participated in this transaction. An evidence of a transaction is generated by wireless PKI mechanism such that U and RI cannot repudiate sending and receiving the message respectively. U generates a mobile agent which carries encrypted payment information to RI. This mobile agent is also issued a proxy certificate by U; this certificate guarantees the binding relationship between them. One trusted third party acts as a lightweight notary for evidence generation. One advantage of this agent-based non-repudiation protocol is to reduce inconvenience for mobile clients such as connection time; it causes difficulty for fair transaction for mobile DRM.

[1]  E. F. Michiels,et al.  ISO/IEC 10181-4:1995 Information technology Open Systems Interconnection Security frameworks for open systems: Non-repudiation framework , 1996 .

[2]  Jens Grossklags,et al.  Software agents and market (in) efficiency: a human trader experiment , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[3]  Andreu Riera,et al.  Securing the itinerary of mobile agents through a non-repudiation protocol , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[4]  David M'Raïhi,et al.  E-commerce applications of smart cards , 2001, Comput. Networks.

[5]  Wei-Bin Lee,et al.  A new delegation-based authentication protocol for use in portable communication systems , 2005, IEEE Transactions on Wireless Communications.

[6]  Felix C. Freiling,et al.  Solving Fair Exchange with Mobile Agents , 2000, ASA/MA.

[7]  Jose L. Muñoz,et al.  Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts , 2003, ICWE.

[8]  Fei-Yue Wang,et al.  Agent-Based Control for Networked Traffic Management Systems , 2005, IEEE Intell. Syst..

[9]  Yuh-Min Tseng,et al.  Authentication and Billing Protocols for the Integration of WLAN and 3G Networks , 2004, Wirel. Pers. Commun..

[10]  E. K. Park,et al.  Performance of an enhanced GSM protocol supporting non-repudiation of service , 1999, Comput. Commun..

[11]  Dieter Gollmann,et al.  A fair non-repudiation protocol , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[12]  Luo Junzhou,et al.  On timeliness of a fair non-repudiation protocol , 2004, InfoSecu '04.

[13]  Levente Buttyán,et al.  On the Problem of Trust in Mobile Agent Systems , 1998, NDSS.

[14]  Mohamed Salah Hamdi,et al.  MASACAD: a multiagent based approach to information customization , 2006, IEEE Intelligent Systems.

[15]  Miguel Mira da Silva,et al.  Secure Mobile Agent Digital Signatures with Proxy Certificates , 2001, E-Commerce Agents.

[16]  Ee-Peng Lim,et al.  Non-repudiation in an agent-based electronic commerce system , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.

[17]  Stefanos Gritzalis,et al.  Integration of non-repudiation services in mobile DRM scenarios , 2007, Telecommun. Syst..

[18]  Robert H. Deng,et al.  Evolution of Fair Non-repudiation with TTP , 1999, ACISP.

[19]  Omaima Bamasak,et al.  A distributed reputation management scheme for mobile agent based e-commerce applications , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.