{"title":"A free-roaming mobile agent security protocol against colluded truncation attack","authors":"Fang Linna, Liu Jun","doi":"10.1109/ICBMEI.2011.5917831","DOIUrl":null,"url":null,"abstract":"To secure the free-roaming mobile agent's data protection, especially to resist the colluded truncation attack, we made a tentative analysis on the current solutions of these problems and proposed a new security mechanism, which is called Signature Trust Chain Mechanism (STCM). In STCM, data is encrypted into a divisible whole for protection. When reaching a host, agent concatenates the data carried by it with data generated on this host then encrypts them and sending identity information to trusted third party. When agent comes back to trusted third party, it will compare path from passing data with path from identity information each hop gives trust third party to find out if there exists attack. Then trust third party sends corresponding data to task sponsor. Analysis shows the mechanism can defend the colluded truncation attack effectively.","PeriodicalId":299461,"journal":{"name":"2010 2nd International Conference on Education Technology and Computer","volume":"124 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 2nd International Conference on Education Technology and Computer","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICBMEI.2011.5917831","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
To secure the free-roaming mobile agent's data protection, especially to resist the colluded truncation attack, we made a tentative analysis on the current solutions of these problems and proposed a new security mechanism, which is called Signature Trust Chain Mechanism (STCM). In STCM, data is encrypted into a divisible whole for protection. When reaching a host, agent concatenates the data carried by it with data generated on this host then encrypts them and sending identity information to trusted third party. When agent comes back to trusted third party, it will compare path from passing data with path from identity information each hop gives trust third party to find out if there exists attack. Then trust third party sends corresponding data to task sponsor. Analysis shows the mechanism can defend the colluded truncation attack effectively.