Title :
Anonymous Agent with Anonymous Itinerary
Author :
Raji, Fatemeh ; Ladani, Behrouz Tork ; Brenjkoub, Mehdi
Author_Institution :
Univ. of Isfahan, Isfahan
Abstract :
The mobile agent is desired to be able to roam autonomously and anonymously from one agent platform to another one. To achieve this aim, a novel secure protocol is proposed to provide anonymity of the agent owner as well as the agent itinerary. In the presented method, a set of trusted auxiliary hosts named as mixers are employed to insert a transient fictitious owner in each step of the agent itinerary. The ability of the proposed protocol is analyzed and its resistance against traffic analysis attacks is illustrated.
Keywords :
mobile agents; security of data; anonymous agent; anonymous itinerary; mobile agent; secure protocol; traffic analysis attacks; Communication system traffic control; Computational intelligence; Computer networks; Computer security; Distributed computing; IP networks; Mobile agents; Mobile communication; Protocols; Telecommunication traffic;
Conference_Titel :
Computational Intelligence and Security Workshops, 2007. CISW 2007. International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3073-4
DOI :
10.1109/CISW.2007.4425551