Proposed Protocol for State Tampering Mobile Agents Security

Authors

  • Abdul razak Ali Computer & Software Engineering Department, Al-Mustansiriyah University, Baghdad, Iraq Author

Keywords:

mobile agents security, state tampering, execution tracing, publicly verified signature chain, digital envelope

Abstract

Several advantages have been identified in using mobile agents in distributed systems .The most frequently advantages include: reduction of network load ,decrease in communication latency, dynamic adoption and better support for mobile devices with intermittent connection .However the benefits offered have not been sufficient to simulate their wide spread deployment, the main reason is their inherent security risks. Security issues consist of protecting the agent platform and protecting the mobile agent. The toughest task is protecting the mobile agent, which is subject to attacks from the platform it is operating on. This paper introduces a protocol based on publicly verified signature chain, digital envelope and centralized Trusted Third Party (TTP) scheme that allows detection of attacks against code, state and execution flow of mobile agents.

Downloads

Key Dates

Published

2009-12-01

How to Cite

Proposed Protocol for State Tampering Mobile Agents Security. (2009). Journal of Engineering and Sustainable Development, 13(4), 49-57. https://jeasd.uomustansiriyah.edu.iq/index.php/jeasd/article/view/1496

Similar Articles

21-30 of 226

You may also start an advanced similarity search for this article.