By Topic

A Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack without trusted third party

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Fan Linna ; Institution of Communication Engineering, PLA University of Science and Technology, Nanjing, China ; Liu Jun

To secure the free-roaming mobile agent's data protection, especially to resist the colluded truncation attack, we proposed a new security mechanism which can not only satisfy security demands, but can also solve the bottleneck problem caused by trusted third party, we call the new mechanism ISTCM. In ISTCM, task sponsor first chooses a certain number of hosts as partners at random. When agent reaches a host, the host consults the partners of encryption key. Data generated by the host is encrypted into a divisible whole for protection. At the same time, the host sends its identity information to partners according to threshold scheme. When agent comes back to task sponsor, it will compare path from passing data with path from the partners to find out if there exists attack. Analysis shows the mechanism can defend the colluded truncation attack effectively.

Published in:

Business Management and Electronic Information (BMEI), 2011 International Conference on  (Volume:2 )

Date of Conference:

13-15 May 2011