• DocumentCode
    3263161
  • Title

    Analysis of a free roaming agent result-truncation defense scheme

  • Author

    Zhou, Jianying ; Onieva, Jose A. ; Lopez, Javier

  • Author_Institution
    Inst. for Infocomm Res., Heng Mui Keng Terrace, Singapore
  • fYear
    2004
  • fDate
    6-9 July 2004
  • Firstpage
    221
  • Lastpage
    226
  • Abstract
    Mobile agents play an important role in electronic commerce. Security in free-roaming agents is especially hard to achieve when the mobile code is executed in hosts that may behave maliciously. Some schemes have been proposed to protect agent data (or computation results). However, a known vulnerability of these techniques is the truncation attack where two visited hosts (or one revisited host) can collude to discard the partial results collected between their respective visits. Cheng and Wei proposed a scheme in IC1CS´O2 to defense against the truncation of computation results of free-roaming agents (Cheng and Wei, 2002). Cheng-Wei scheme is effective against such an attack in most cases. However, we demonstrate that it still suffers from the truncation attack when a special loop is established on the path of a free-roaming agent. We further propose two amendments to Cheng-Wei scheme to avoid such an attack.
  • Keywords
    cryptography; mobile agents; Cheng-Wei scheme; agent data; cryptographic protocol; defense scheme; electronic commerce; free roaming agent; mobile agents; mobile code; security; truncation attack; Computer networks; Computer science; Cryptographic protocols; Cryptography; Data mining; Data security; Electronic commerce; Java; Mobile agents; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    e-Commerce Technology, 2004. CEC 2004. Proceedings. IEEE International Conference on
  • Print_ISBN
    0-7695-2098-7
  • Type

    conf

  • DOI
    10.1109/ICECT.2004.1319737
  • Filename
    1319737