Advertisement

Mobile Agent-Based Digital Rights Management Scheme Implementation

  • Bartłomiej Ziółkowski
  • Janusz Stokłosa
Part of the Communications in Computer and Information Science book series (CCIS, volume 88)

Abstract

This paper describes an application of cryptographic mobile agents to implement a simple Digital Rights Management (DRM) scheme. The scheme is designed upon a combination of mobile clueless agents, a threshold scheme and one-time passwords. The main goal of the scheme was to make it secure yet lightweight and easy to deploy and to maintain. The scheme is derived from Open Mobile Alliance’s DRM system, which is a leading DRM standard for mobile devices. We describe here the architecture and the implementation of the scheme together with the results of the experiments. The reference implementation was done in Java and tested on JADE agent platform. The experiments were conducted on a distributed system consisting of various machines running different operating systems. We measured the performance of the proposed scheme to assess its usability for real-life applications.

Keywords

cryptographic mobile agents digital rights management threshold scheme one-time passwords digital content privacy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Open Mobile Alliance: OMA DRM Specification. Candidate version 2.0 (2005)Google Scholar
  2. 2.
    Onieva, J., Lopez, J., et al.: Extending an OMA-based DRM Framework with Non-repudiation Services. In: Proceedings of the 5th IEEE Symposium on Signal Processing and Information Technology, pp. 472–477. IEEE Computer Society, Los Alamitos (2005)CrossRefGoogle Scholar
  3. 3.
    Zheng, Y., He, D., et al.: Secure DRM Scheme for Future Mobile Networks Based on Trusted Mobile Platform. In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WCNM 2005). IEEE Press, Los Alamitos (2005)Google Scholar
  4. 4.
    Koenen, R., Lacy, J., et al.: The Long March to Interoperable Digital Rights Management. Proceedings of the IEEE 92(6), 883–897 (2004)CrossRefGoogle Scholar
  5. 5.
    Ziółkowski, B., Stokłosa, J.: Mobile Agent-based Digital Rights Management Scheme. In: Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM 2007), IEEE Conference Proceedings, pp. 213–218. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  6. 6.
    Riordan, J., Schneier, B.: Environmental Key Generation Towards Clueless Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 15–24. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  7. 7.
    Menezes, A., van Oorschot, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  8. 8.
    Ziółkowski, B., Stokłosa, J.: A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol. In: Kowalik, J., Górski, J., Sachenko, A. (eds.) Cyberspace Security and Defense: Research Issues. NATO Science Series, vol. 196, pp. 331–345. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Karnin, E., Green, J., Hellman, M.: On Secret Sharing Systems. IEEE Transactions on Information Theory IT-29, 35–41 (1983)CrossRefGoogle Scholar
  10. 10.
    Haller, N.M.: The S/Key One-Time Password System. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 151–157. IEEE Press, Los Alamitos (1994)Google Scholar
  11. 11.
    Wang, X., Yin, Y., et al.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)Google Scholar
  12. 12.
    Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent System (AAMAS 2006), pp. 1116–1118. ACM, New York (2006)CrossRefGoogle Scholar
  13. 13.
    Bürkle, A., Essendorfer, B., et al.: A Test Suite for the Evaluation of Mobile Agent Platform Security. In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2006), pp. 752–756. IEEE Computer Society, Los Alamitos (2006)CrossRefGoogle Scholar
  14. 14.
    Chmiel, K., Tomiak, D., et al.: Testing the Efficiency of JADE Agent Platform. In: ISPDC 2004: Proceedings of the Third International Symposium on Parallel and Distributed Computing/Third International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks, pp. 49–56. IEEE Computer Society, Los Alamitos (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Bartłomiej Ziółkowski
    • 1
  • Janusz Stokłosa
    • 1
  1. 1.Division of Information System SecurityPoznań University of TechnologyPoznańPoland

Personalised recommendations