A free-roaming mobile agent security protocol against colluded truncation attack without trusted third party

6Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To secure the free-roaming mobile agent's data protection, especially to resist the colluded truncation attack, we proposed a new security mechanism which can not only satisfy security demands, but can also solve the bottleneck problem caused by trusted third party, we call the new mechanism ISTCM. In ISTCM, task sponsor first chooses a certain number of hosts as partners at random. When agent reaches a host, the host consults the partners of encryption key. Data generated by the host is encrypted into a divisible whole for protection. At the same time, the host sends its identity information to partners according to threshold scheme. When agent comes back to task sponsor, it will compare path from passing data with path from the partners to find out if there exists attack. Analysis shows the mechanism can defend the colluded truncation attack effectively. © 2011 IEEE.

Cite

CITATION STYLE

APA

Linna, F., & Jun, L. (2011). A free-roaming mobile agent security protocol against colluded truncation attack without trusted third party. In BMEI 2011 - Proceedings 2011 International Conference on Business Management and Electronic Information (Vol. 2, pp. 14–18). https://doi.org/10.1109/ICBMEI.2011.5917831

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free