By Topic

A Novel Free-Roaming Mobile Agent Security Mechanism by Trusted Computing Technology

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Silei Lei ; Instn. of Commun. Eng., PLA Univ. of Sci. & Technol., Nanjing ; Jun Liu ; Junmo Xiao

Protecting data of free-roaming mobile agents has drawn much attention in recent years. But no perfect solution has ever been proposed. Many of the solutions are vulnerable by colluded truncation attacks. In this study we analyze available methods, and design a novel mechanism by cooperation between two kinds of agents- Task Agent and Secondary Agent. It also exploits new functionalities and mechanism provided by the trusted computing technology. Task Agent moves freely in the net to complete some task. Secondary Agent moves to an anonymous third party who has trusted platform module on it, then uses the data computed by Task Agent to extend some platform configuration register in the trusted platform module irrevocably. The special property of platform configuration register and the integrity reporting method of the trusting platform module guarantee this mechanismpsilas security. The novel mechanism can effectively detect attacks included colluded truncation attack and protect the data carried by mobile agent.

Published in:

Computer Science and Software Engineering, 2008 International Conference on  (Volume:3 )

Date of Conference:

12-14 Dec. 2008