Abstract
When using mobile agents, numerous security issues must be considered. In this note we propose two methods to improve the security and reliability of mobile agent based transactions in an environment which may contain some malicious hosts.
The work reported in this paper has formed part of the Software Based Systems work area of the Core 2 Research Programme of the Virtual Centre of Excellence in Mobile & Personal Communications, Mobile VCE, www.mobilevce.co.uk, whose funding support, including that of EPSRC, is gratefully acknowledged. More detailed technical reports on this research are available to Industrial Members of Mobile VCE.
Chapter PDF
Similar content being viewed by others
References
Niklas Borselius, Chris J. Mitchell, and Aaron Wilson. A pragmatic alternative to undetachable signatures. Preprint, 2001.
Niklas Borselius, Chris J. Mitchell, and Aaron Wilson. Undetachable threshold signatures. To be presented at the IMA Conference on Cryptography and Coding, December 2001 (proceedings to be published in the Springer-Verlag LNCS series), 2001.
Y. Desmedt. Society and group oriented cryptography. In C. Pomerance, editor, Advances in Cryptology-Crypto’ 87 proceedings, number 293 in LNCS, pages 120–127. Springer-Verlag, Berlin, 1988.
Ivan Damåkd and Maciej Koprowski. Practical threshold RSA signatures without a trusted dealer. In Birgit Pfitzmann, editor, Advances in Cryptology-EUROCRYPT 2001, number 2045 in LNCS, pages 152–165. Springer-Verlag, Berlin, 2001.
William Farmer, Joshua Guttmann, and Vipin Swarup. Security for mobile agents: Authentication and state appraisal. In Proceedings of the European Symposium on Research in Computer Security (ESORICS), number 1146 in LNCS, pages 118–130. Springer-Verlag, Berlin, 1996.
Vesna Hassler. Security Fundamentals for E-commerce. Artech House, 2000.
Fritz Hohl. A model of attacks of malicious hosts against mobile agents. In Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pages 105–120, 1998.
Fritz Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Giovanni Vigna, editor, Mobile Agents and Security, number 1419 in LNCS, pages 92–113. Springer-Verlag, Berlin, 1998.
Panayiotis Kotzanikolaou, Mike Burmester, and Vassilios Chrissikopoulos. Secure transactions with mobile agents in hostile environments. In E. Dawson, A. Clark, and C. Boyd, editors, Information Security and Privacy, Proceedings of the 5th Australasian Conference A CISP 2000, number 1841 in LNCS, pages 289–297. Springer-Verlag, Berlin, 2000.
Susan K. Langford. Threshold DSS signatures without a trusted party. In D. Coppersmith, editor, Advances in Cryptology-Cypto’ 95 proceedings, number 963 in LNCS, pages 397–409. Springer-Verlag, Berlin, 1995.
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. Discrete Mathematics and Its Applications. CRC Press, October 1996. Available on-line at http://www.cacr.math.uwaterloo.ca/hac.
Sau-Koon Ng. Protecting mobile agents against malicious hosts. Master’s thesis, The Chinese University of Hong Kong, June 2000.
Lars Rasmusson and Sverker Jansson. Simulated social control for secure internet commerce. In New Security Paradigms’ 96, pages 18–26. ACM Press, 1996.
James Riordan and Bruce Schneier. Environmental key generation towards clueless agents. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS, pages 15–24. Springer-Verlag, Berlin, 1998.
Victor Shoup. Practical threshold signatures. In Bart Preneel, editor, Proceedings of EuroCrypt 2000, number 1807 in LNCS, pages 207–220. Springer-Verlag, Berlin, 2000.
Tomas Sander and Christian Tschudin. Towards mobile cryptography. Technical Report 97-049, International Computer Science Institute, Berkeley, 1997. Available at http://ww.icsi.berkeley.edu/sander/publications/tr-97-049.ps.
Tomas Sander and Christian Tschudin. Protecting mobile agents against malicious hosts. In Giovanni Vigna, editor, Mobile Agents and Security, number 1419 in LNCS, pages 44–60. Springer-Verlag, Berlin, 1998. Available from http://www.icsi.berkley.edu/sander/publications/MA-protect.ps.
Giovanni Vigna. Protecting mobile agents through tracing. In Proceedings of the Third ECOOP Workshop on Operating System support for Mobile Object Systems, 1997.
U. G. Wilhelm, S. Staamann, and L. Buttyin. On the problem of trust in mobile agent systems. Available from http://www.isoc.org/isoc/conferences/ndss/98/ndss98.htm, 1998. Network and Distributed System Security (NDSS’98) Symposium.
Bennet Yee. A sanctuary for mobile agents. In DARPA Workshop on Foundations for Secure Mobile code, 1997. Available from http://www.cs.nps.navy.mil/research/languages/statemensts/bsy.ps.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Borselius, N., Mitchell, C.J., Wilson, A. (2002). On Mobile Agent Based Transactions in Moderately Hostile Environments. In: De Decker, B., Piessens, F., Smits, J., Van Herreweghen, E. (eds) Advances in Network and Distributed Systems Security. IFIP International Federation for Information Processing, vol 78. Springer, Boston, MA. https://doi.org/10.1007/0-306-46958-8_12
Download citation
DOI: https://doi.org/10.1007/0-306-46958-8_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-7923-7558-6
Online ISBN: 978-0-306-46958-9
eBook Packages: Springer Book Archive