DocumentCode :
408272
Title :
Performance evaluation of data integrity mechanisms for mobile agents
Author :
Gunupudi, Vandana ; Tate, Stephen R.
Author_Institution :
Dept. of Comput. Sci. & Eng., North Texas Univ., Denton, TX, USA
Volume :
1
fYear :
2004
fDate :
5-7 April 2004
Firstpage :
62
Abstract :
A primary security challenge of the mobile agent paradigm is that of protecting the data carried by a mobile agent. With the growing popularity of e-commerce applications that use software agents, the protection of mobile agent data has become imperative. To that end, we evaluate the performance of four methods that protect the data integrity of mobile agents. While some techniques have been proposed in the literature, there has previously been no experimental study comparing the various alternatives. The set of integrity mechanisms that we investigate includes existing approaches known as the Partial Result Authentication Codes (PRACs), Hash Chaining, and Set Authentication Code methods, as well as a technique of our own design, which we refer to as the Modified Set Authentication Code method. The Modified Set Authentication Code method addresses several limitations of the Set Authentication Code method. The performance experiments were run using the DADS mobile agent system, for which we designed a Data Integrity Module. The experimental results showed that our Modified Set Authentication Code technique performed comparably to the Set Authentication Code method, showing some improvement in the key generation times and agent size. In this paper, we compare the trade-offs between security features and performance for all four methods and identify the niche that each technique could fill.
Keywords :
Internet; cryptography; data integrity; message authentication; mobile agents; telecommunication security; DADS mobile agent system; Internet security; PRAC; agent size; data integrity mechanisms; data integrity module; data protection; e-commerce applications; hash chaining; key generation; mobile agents; modified set authentication code method; partial result authentication codes; performance evaluation; security challenge; security features; set authentication code methods; software agents; Application software; Authentication; Computer science; Computer security; Data engineering; Data security; Electronic commerce; Mobile agents; Protection; Software agents;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on
Print_ISBN :
0-7695-2108-8
Type :
conf
DOI :
10.1109/ITCC.2004.1286427
Filename :
1286427
Link To Document :
بازگشت