By Topic

Access Control and Key Management Scheme Based on Bilinear Pairings over Elliptic Curves for Mobile Agent

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Chia-Hui Liu ; Electr. Eng. Dept., Nat. Taiwan Univ., Taipei, Taiwan ; Yu-Fang Chung ; Tzer-Shyong Chen ; Sheng-De Wang

The related techniques and applications of e-commerce have always been the outmost concerned issue for researchers. Particularly, the use of mobile agent is an important technique on the applications of e-commerce. Mobile agent, for its high autonomy and mobility, can move freely in different execution environments, can automatically detect the resided environment, and react accordingly. Finally, the mobile agent can complete the tasks which are assigned by the users. These characteristics help shaping the mobile agent becomes the most suitable for e-commerce applications. It is always risky to transfer confidential information over an open Internet environment. When the mobile agent roams among the hosts over the Internet or exchanges information with others, the users would have concerns whether the mobile agent could be attacked by manipulated hosts or the confidential information that are carried could be stolen and tampered by the others. All these worries make the safety of the mobile agent on the Internet an important issue. This paper proposes a suitable security scheme for the mobile agent. The scheme is consist of a hierarchy structured key management and an access control scheme based on bilinear pairing over elliptic curves. The paper aims to add improvements on the key management and the access control scheme of Volker and Mehrdad and resolves the issue of storage waste by storing the overlapping secret keys of the mobile agent. Based upon the results of the security and performance analysis on this paper, the proposed scheme is proven to protect the mobile agent in an efficient and secure.

Published in:

Multimedia and Ubiquitous Engineering, 2009. MUE '09. Third International Conference on

Date of Conference:

4-6 June 2009