To secure the free-roaming mobile agent's data protection, especially to resist the colluded truncation attack, we proposed a new security mechanism which can not only satisfy security demands, but can also solve the bottleneck problem caused by trusted third party, we call the new mechanism ISTCM. In ISTCM, task sponsor first chooses a certain number of hosts as partners at random. When agent reaches a host, the host consults the partners of encryption key. Data generated by the host is encrypted into a divisible whole for protection. At the same time, the host sends its identity information to partners according to threshold scheme. When agent comes back to task sponsor, it will compare path from passing data with path from the partners to find out if there exists attack. Analysis shows the mechanism can defend the colluded truncation attack effectively. © 2011 IEEE.
CITATION STYLE
Linna, F., & Jun, L. (2011). A free-roaming mobile agent security protocol against colluded truncation attack without trusted third party. In BMEI 2011 - Proceedings 2011 International Conference on Business Management and Electronic Information (Vol. 2, pp. 14–18). https://doi.org/10.1109/ICBMEI.2011.5917831
Mendeley helps you to discover research relevant for your work.