DocumentCode
2834860
Title
CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack
Author
Bellemin, Velik ; Araragi, Tadashi
Author_Institution
Swiss Fed. Inst. of Technol.
fYear
2006
fDate
25-27 May 2006
Firstpage
240
Lastpage
247
Abstract
This paper presents a new way for applying a cryptocomputing method that prevents some types of attack from malicious hosts against mobile agents running on them. This method addresses the protection of the interaction protocol of each agent. In this method, encryptions of agent interaction protocols by individual keys are achieved to prevent eavesdropping by malicious hosts, while retaining the hosts´ capability to execute the interaction. The method also introduces integrity check procedures to prevent such tampering as cut and paste and replay attacks by malicious hosts. We show a basic framework with which this cryptocomputing method functions and introduce a modified ElGamal encryption having a special matching function that enables this method
Keywords
cryptography; mobile agents; ElGamal encryption; agent interaction protocol; cryptocomputing; integrity check procedure; malicious host attack; mobile agents; Cryptography; Data security; Electronic commerce; Mobile agents; Protection; Protocols; Skeleton; Telegraphy; Telephony; Web and internet services;
fLanguage
English
Publisher
ieee
Conference_Titel
Dependability of Computer Systems, 2006. DepCos-RELCOMEX '06. International Conference on
Conference_Location
Szklarska Poreba
Print_ISBN
0-7695-2565-2
Type
conf
DOI
10.1109/DEPCOS-RELCOMEX.2006.16
Filename
4024055
Link To Document