A free-roaming mobile agent security protocol based on anonymous onion routing and k anonymous hops backwards

被引:0
|
作者
Wang, Xiaogang [1 ]
Xu, Darren [2 ]
Lu, Junzhou [3 ]
机构
[1] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Peoples R China
[2] YRC Worldwide Technol, Kansas City, KS USA
[3] Southeast Univ, Sch Comp Sci & Engn, Nanjing, Peoples R China
来源
AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS | 2008年 / 5060卷
基金
中国国家自然科学基金;
关键词
mobile agent; colluded truncation; anonymous onion routing;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Security and anonymity are vital for free-roaming mobile agent-based applications. Based on anonymous onion routing, this paper proposes a security protocol to defend truncation attacks for free-roaming mobile agent-based applications. This protocol uses "two hops forwards and k anonymous hops backwards" chain relation to implement the generally accepted mobile agent security properties. Security analysis proves that this protocol can defend known attacks, especially multiple colluded truncation attacks and provide privacy protection to previously visited servers. Performance evaluation shows this protocol requires limited communication overhead if right parameters are chosen.
引用
收藏
页码:588 / +
页数:3
相关论文
共 17 条
  • [1] On the security of an anonymous roaming protocol in UMTS mobile networks
    Wu, Shuhua
    Pu, Qiong
    Fu, Ji
    MAEJO INTERNATIONAL JOURNAL OF SCIENCE AND TECHNOLOGY, 2012, 6 (01) : 62 - 69
  • [2] A Novel Free-Roaming Mobile Agent Security Protocol Against Colluded Truncation Attacks
    Lei, Silei
    Liu, Jun
    Deng, Chuan
    Xiao, Junmo
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 348 - 353
  • [3] An improved free-roaming mobile agent security protocol against colluded truncation attacks
    Xu, Darren
    Harn, Lein
    Narasimhan, Mayur
    Luo, Junzhou
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 309 - +
  • [4] A Novel Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack by ACK
    Lei, Silei
    Zhang, Rui
    Liu, Jun
    Xiao, Junmo
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 612 - 616
  • [5] Implementation of Trust and Reputation Management for Free-Roaming Mobile Agent Security
    Geetha, G.
    Jayakumar, C.
    IEEE SYSTEMS JOURNAL, 2015, 9 (02): : 556 - 566
  • [6] Security Analyses of an Anonymous Two Factor Authentication Protocol for Roaming Service in Global Mobile Networks
    Chang, Ya-Fen
    Chen, Huan-Wen
    Chang, Ting-Yu
    Tai, Wei-Liang
    22ND IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2021-FALL), 2021, : 213 - 217
  • [7] Performance and Security Analyses of Onion-Based Anonymous Routing for Delay Tolerant Networks
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    Wu, Jie
    Alanazi, Faisal S.
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (12) : 3473 - 3487
  • [8] Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks
    Chen, Siguang
    Wu, Meng
    JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2011, 22 (03) : 519 - 527
  • [9] Hash-based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks
    Lo, Nai-Wei
    Chiang, Meng-Chih
    Hsu, Chao Yang
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 55 - 62
  • [10] Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks
    Siguang Chen1
    2.College of Telecommunications and Information Engineering
    Journal of Systems Engineering and Electronics, 2011, 22 (03) : 519 - 527