DocumentCode
3263161
Title
Analysis of a free roaming agent result-truncation defense scheme
Author
Zhou, Jianying ; Onieva, Jose A. ; Lopez, Javier
Author_Institution
Inst. for Infocomm Res., Heng Mui Keng Terrace, Singapore
fYear
2004
fDate
6-9 July 2004
Firstpage
221
Lastpage
226
Abstract
Mobile agents play an important role in electronic commerce. Security in free-roaming agents is especially hard to achieve when the mobile code is executed in hosts that may behave maliciously. Some schemes have been proposed to protect agent data (or computation results). However, a known vulnerability of these techniques is the truncation attack where two visited hosts (or one revisited host) can collude to discard the partial results collected between their respective visits. Cheng and Wei proposed a scheme in IC1CS´O2 to defense against the truncation of computation results of free-roaming agents (Cheng and Wei, 2002). Cheng-Wei scheme is effective against such an attack in most cases. However, we demonstrate that it still suffers from the truncation attack when a special loop is established on the path of a free-roaming agent. We further propose two amendments to Cheng-Wei scheme to avoid such an attack.
Keywords
cryptography; mobile agents; Cheng-Wei scheme; agent data; cryptographic protocol; defense scheme; electronic commerce; free roaming agent; mobile agents; mobile code; security; truncation attack; Computer networks; Computer science; Cryptographic protocols; Cryptography; Data mining; Data security; Electronic commerce; Java; Mobile agents; Protection;
fLanguage
English
Publisher
ieee
Conference_Titel
e-Commerce Technology, 2004. CEC 2004. Proceedings. IEEE International Conference on
Print_ISBN
0-7695-2098-7
Type
conf
DOI
10.1109/ICECT.2004.1319737
Filename
1319737
Link To Document