• DocumentCode
    2834860
  • Title

    CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack

  • Author

    Bellemin, Velik ; Araragi, Tadashi

  • Author_Institution
    Swiss Fed. Inst. of Technol.
  • fYear
    2006
  • fDate
    25-27 May 2006
  • Firstpage
    240
  • Lastpage
    247
  • Abstract
    This paper presents a new way for applying a cryptocomputing method that prevents some types of attack from malicious hosts against mobile agents running on them. This method addresses the protection of the interaction protocol of each agent. In this method, encryptions of agent interaction protocols by individual keys are achieved to prevent eavesdropping by malicious hosts, while retaining the hosts´ capability to execute the interaction. The method also introduces integrity check procedures to prevent such tampering as cut and paste and replay attacks by malicious hosts. We show a basic framework with which this cryptocomputing method functions and introduce a modified ElGamal encryption having a special matching function that enables this method
  • Keywords
    cryptography; mobile agents; ElGamal encryption; agent interaction protocol; cryptocomputing; integrity check procedure; malicious host attack; mobile agents; Cryptography; Data security; Electronic commerce; Mobile agents; Protection; Protocols; Skeleton; Telegraphy; Telephony; Web and internet services;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Dependability of Computer Systems, 2006. DepCos-RELCOMEX '06. International Conference on
  • Conference_Location
    Szklarska Poreba
  • Print_ISBN
    0-7695-2565-2
  • Type

    conf

  • DOI
    10.1109/DEPCOS-RELCOMEX.2006.16
  • Filename
    4024055