International Journal of Wireless and Microwave Technologies(IJWMT)
ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)
Published By: MECS Press
IJWMT Vol.1, No.2, Apr. 2011
A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack
Full Text (PDF, 157KB), PP.70-74
The security issue of MA(mobile agent) is concerned for a long time, Especially for attack from malicious hosts. The paper proposes a new security routing protocol whose highlight is integrating group signature into MA system. It will decrease the probability that malicious hosts cluster to skip one host deliberately, and avoid too much invalid connection to host who is offline or rejective to service. Besides, in new protocol, each host will hold less public keys of other hosts and save time on verifying MA. The last superiority of new protocol is improving the efficiency of DoS(denial of service) attacker tracing.
Cite This Paper
Wenbing Wang,Zhifeng Zhang,"A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack", IJWMT, vol.1, no.2, pp.70-74, 2011.
Jansen W A, "A privilege management scheme for mobile agent systems," First International Workshop on Security of Mobile Multi-Agent Systems. SEMAS-2001．
Tomas Sander，Christian F Tschudin, "Protecting mobile agents against malicious hosts," Lecture Notes in Computer Science.1998，1419：44—49．
Hohl F, "Time limited blackbox security：protecting mobile agents from malicious hosts," Lecture Notes in Computer Science. 1998，1419：92¬—93．
Cubaleska Biljana，Qiu Weidong，Schneider Markus, "How to play sherlock holmes in the world of mobile agent," Lecture Notes in Computer Science. 2002，2384：449—454．
Chaum D, van Heyst E, "Group signatures," Lecture Notes in Computer science. 1991，547：257—265．
Bellare Mihir，Shi Haixia，zhang Chong, "Foudations of group signatures：the case of dynamic groups," Lecture Notes in Computer Science. 2005，3376：136