Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Protecting mobile-agent data collection against blocking attacks

Published: 01 June 2006 Publication History

Abstract

Full-scale adoption of mobile agent technology in untrustworthy network environment, such as Internet, has been delayed due to several security complexities. The protection of mobile agents against the attacks of malicious hosts is considered a very challenging security problem. It has inspired lot of research interest, but very few measures exist to counter blocking attack where a host with malicious intentions refuses to transmit a mobile agent to the next host. It becomes an important requirement for the agent owner to rescue the data collected by the agent under custody and redeem a loss. In this paper, we present two schemes that rescue the offering results from a malicious host's blocking attack, and make a comparison of their performance from several aspects. Our approach has two new features that previous protocols lack. It allows the proper handling of time-sensitive offers and supports the gradual decision-making execution.

References

[1]
Assis Silva, F.M. and Popescu-Zeletin, R., An approach for providing mobile agent fault tolerance. In: Rothermel, K., Hohl, F. (Eds.), LNCS, vol. 1477. Springer-Verlag, Berlin Heidelberg. pp. 14-25.
[2]
Bierman, E. and Cloete, E., Classification of malicious host threats in mobile agent computing. In: Proceedings of SAICSIT, pp. 141-148.
[3]
Cheng, J. and Wei, V., Defenses against the truncation of computation results of free-roaming agents. In: LNCS, vol. 2513. pp. 1-12.
[4]
Claessens, J., Preneel, B. and Vandewalle, J., (How) Can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. ACM Transactions on Internet Technology. v3 i1. 28-48.
[5]
Esparza, O., Soriano, M., Muñoz, J.L. and Forné, J., A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. In: Proceedings of 8th IEEE International Symposium on Computers and Communication,
[6]
Jahansen, D., Marzullo, K., Schneider, F.B., Jacobsen, K. and Zagorodnov, D., NAP: practical fault-tolerance for itinerant computations. In:
[7]
Karnik, N.M. and Tripathi, A.R., Design issues in mobile-agent programming systems. IEEE Concurrency. v6 i3. 52-61.
[8]
Karjoth, G., Secure mobile agent-based merchant brokering in distributed marketplaces. In: Kotz, D., Mattern, F. (Eds.), LNCS, vol. 1882. pp. 44-56.
[9]
Karnik, N. and Tripathi, A., Agent server architecture for the Ajanta mobile-agent system. In: Proceedings International Conference Parallel and Distributed Processing Techniques and Applications, CSREA Press. pp. 63-73.
[10]
Kocher, P., On certificate revocation and validation. In: LNCS, vol. 1465. pp. 172-177.
[11]
S. Micali, Certificate revocation system. US Patent 6292893, September 2001.
[12]
Pleisch, S. and Schiper, A., Fault-tolerant mobile agent execution. IEEE Transactions on Computers. v52 i2.
[13]
K. Rothermel, M. Strasser, A protocol for preserving the exactly-once property of mobile agents, Technical Report 1997/18, University of Stuttgart, Department of Informatics, October 1997.
[14]
Rothermel, K. and Strasser, M., A fault-tolerant protocol for providing the exactly-once property of mobile agents. In: Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems, pp. 100-108.
[15]
Shiraishi, M., Enokido, T. and Takizawa, M., Fault-tolerant mobile agents in distributed objects systems. In: Proceedings of the ninth IEEE Workshop on Future Trends of Distributed Computing Systems, pp. 145-151.
[16]
Silva, L.M., Batista, V. and Silva, J.G., Fault-tolerant execution of mobile agents. In: Proceedings of International Conference on Dependable Systems and Networks (DSN 2000), pp. 135-143.
[17]
Strasser, M. and Rothermel, K., Reliability concepts for mobile agents. International Journal of Cooperative Information Systems. v7 i4. 355-382.
[18]
J.E. W, Mobile agents, Tech. Report, General Magic, Los Angeles, 1995.
[19]
Zhou, J., Bao, F. and Deng, R., An efficient public-key framework. In: Proceedings of 2003 ICICS, pp. 88-99.
[20]
Zhou, J., Onieva, J.A. and Lopez, J., Protecting free roaming agents against result-truncation attack. In:

Cited By

View all
  • (2009)Efficient migration for mobile computing in distributed networksComputer Standards & Interfaces10.1016/j.csi.2007.10.01131:1(40-47)Online publication date: 1-Jan-2009
  1. Protecting mobile-agent data collection against blocking attacks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Computer Standards & Interfaces
    Computer Standards & Interfaces  Volume 28, Issue 5
    June, 2006
    118 pages

    Publisher

    Elsevier Science Publishers B. V.

    Netherlands

    Publication History

    Published: 01 June 2006

    Author Tags

    1. Blocking attack
    2. Fault tolerance
    3. Gradual decision-making execution
    4. Mobile agent
    5. Time-sensitive offers

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2009)Efficient migration for mobile computing in distributed networksComputer Standards & Interfaces10.1016/j.csi.2007.10.01131:1(40-47)Online publication date: 1-Jan-2009

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media