Skip to main content

Mobile Agent-Based Digital Rights Management Scheme Implementation

  • Conference paper
  • 1149 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 88))

Abstract

This paper describes an application of cryptographic mobile agents to implement a simple Digital Rights Management (DRM) scheme. The scheme is designed upon a combination of mobile clueless agents, a threshold scheme and one-time passwords. The main goal of the scheme was to make it secure yet lightweight and easy to deploy and to maintain. The scheme is derived from Open Mobile Alliance’s DRM system, which is a leading DRM standard for mobile devices. We describe here the architecture and the implementation of the scheme together with the results of the experiments. The reference implementation was done in Java and tested on JADE agent platform. The experiments were conducted on a distributed system consisting of various machines running different operating systems. We measured the performance of the proposed scheme to assess its usability for real-life applications.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Open Mobile Alliance: OMA DRM Specification. Candidate version 2.0 (2005)

    Google Scholar 

  2. Onieva, J., Lopez, J., et al.: Extending an OMA-based DRM Framework with Non-repudiation Services. In: Proceedings of the 5th IEEE Symposium on Signal Processing and Information Technology, pp. 472–477. IEEE Computer Society, Los Alamitos (2005)

    Chapter  Google Scholar 

  3. Zheng, Y., He, D., et al.: Secure DRM Scheme for Future Mobile Networks Based on Trusted Mobile Platform. In: Proceedings of the IEEE International Conference on Wireless Communications, Networking and Mobile Computing (WCNM 2005). IEEE Press, Los Alamitos (2005)

    Google Scholar 

  4. Koenen, R., Lacy, J., et al.: The Long March to Interoperable Digital Rights Management. Proceedings of the IEEE 92(6), 883–897 (2004)

    Article  Google Scholar 

  5. Ziółkowski, B., Stokłosa, J.: Mobile Agent-based Digital Rights Management Scheme. In: Proceedings of the 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM 2007), IEEE Conference Proceedings, pp. 213–218. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  6. Riordan, J., Schneier, B.: Environmental Key Generation Towards Clueless Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 15–24. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Menezes, A., van Oorschot, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  8. Ziółkowski, B., Stokłosa, J.: A Cryptographic Mobile Agent Implementing Secure Personal Content Delivery Protocol. In: Kowalik, J., Górski, J., Sachenko, A. (eds.) Cyberspace Security and Defense: Research Issues. NATO Science Series, vol. 196, pp. 331–345. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Karnin, E., Green, J., Hellman, M.: On Secret Sharing Systems. IEEE Transactions on Information Theory IT-29, 35–41 (1983)

    Article  Google Scholar 

  10. Haller, N.M.: The S/Key One-Time Password System. In: Proceedings of the Symposium on Network and Distributed System Security, pp. 151–157. IEEE Press, Los Alamitos (1994)

    Google Scholar 

  11. Wang, X., Yin, Y., et al.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17–36. Springer, Heidelberg (2005)

    Google Scholar 

  12. Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent System (AAMAS 2006), pp. 1116–1118. ACM, New York (2006)

    Chapter  Google Scholar 

  13. Bürkle, A., Essendorfer, B., et al.: A Test Suite for the Evaluation of Mobile Agent Platform Security. In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2006), pp. 752–756. IEEE Computer Society, Los Alamitos (2006)

    Chapter  Google Scholar 

  14. Chmiel, K., Tomiak, D., et al.: Testing the Efficiency of JADE Agent Platform. In: ISPDC 2004: Proceedings of the Third International Symposium on Parallel and Distributed Computing/Third International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Networks, pp. 49–56. IEEE Computer Society, Los Alamitos (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ziółkowski, B., Stokłosa, J. (2010). Mobile Agent-Based Digital Rights Management Scheme Implementation. In: Zavoral, F., Yaghob, J., Pichappan, P., El-Qawasmeh, E. (eds) Networked Digital Technologies. NDT 2010. Communications in Computer and Information Science, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14306-9_49

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14306-9_49

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14305-2

  • Online ISBN: 978-3-642-14306-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics