INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.1, No.2, Apr. 2011

A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack

Full Text (PDF, 157KB), PP.70-74


Views:29   Downloads:1

Author(s)

Wenbing Wang,Zhifeng Zhang

Index Terms

Component; mobile agent; cluster attack; group signature

Abstract

The security issue of MA(mobile agent) is concerned for a long time, Especially for attack from malicious hosts. The paper proposes a new security routing protocol whose highlight is integrating group signature into MA system. It will decrease the probability that malicious hosts cluster to skip one host deliberately, and avoid too much invalid connection to host who is offline or rejective to service. Besides, in new protocol, each host will hold less public keys of other hosts and save time on verifying MA. The last superiority of new protocol is improving the efficiency of DoS(denial of service) attacker tracing.

Cite This Paper

Wenbing Wang,Zhifeng Zhang,"A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack", IJWMT, vol.1, no.2, pp.70-74, 2011.

Reference

[1]Jansen W A, "A privilege management scheme for mobile agent systems," First International Workshop on Security of Mobile Multi-Agent Systems. SEMAS-2001.

[2]Tomas Sander,Christian F Tschudin, "Protecting mobile agents against malicious hosts," Lecture Notes in Computer Science.1998,1419:44—49.

[3]Hohl F, "Time limited blackbox security:protecting mobile agents from malicious hosts," Lecture Notes in Computer Science. 1998,1419:92¬—93.

[4]Cubaleska Biljana,Qiu Weidong,Schneider Markus, "How to play sherlock holmes in the world of mobile agent," Lecture Notes in Computer Science. 2002,2384:449—454.

[5]Chaum D, van Heyst E, "Group signatures," Lecture Notes in Computer science. 1991,547:257—265.

[6]Bellare Mihir,Shi Haixia,zhang Chong, "Foudations of group signatures:the case of dynamic groups," Lecture Notes in Computer Science. 2005,3376:136