Abstract:
Agent security is always a key concern to many mobile agent systems such as distributed intrusion detection systems (DIDS), where an attacker might turn to the mobile age...Show MoreMetadata
Abstract:
Agent security is always a key concern to many mobile agent systems such as distributed intrusion detection systems (DIDS), where an attacker might turn to the mobile agent directory server if he fails to locate the critical IDS hosts/agents. Previous work on mobile agent security (e.g. Volker and Mehrdad's scheme, 1998) often suffers from large code size of the agent and the high computational cost. In this paper, we would like to address these two issues with a new RSA-based key assignment scheme. Both the details of the scheme and its implementation are given. Our analysis shows that not only the above two issues are improved significantly, but the scheme also provides agent's adaptability through dynamic key management and access control strategy.
Date of Conference: 05-05 November 2003
Date Added to IEEE Xplore: 08 December 2003
Print ISBN:0-7695-2038-3
Print ISSN: 1082-3409
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Mobile Agents ,
- Key Assignment ,
- Management Strategies ,
- Computational Cost ,
- Controlled Manner ,
- Key Strategy ,
- Access Control ,
- Mobile System ,
- Key Control ,
- Detailed Scheme ,
- Dynamic Management ,
- Intrusion Detection System ,
- Security Policy ,
- Design Of Agents ,
- Network Bandwidth ,
- Secret Key ,
- Public Key ,
- Security Management ,
- Digital Signature ,
- Critical Host ,
- Public Parameters ,
- Signature Scheme ,
- Decryption Key
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Mobile Agents ,
- Key Assignment ,
- Management Strategies ,
- Computational Cost ,
- Controlled Manner ,
- Key Strategy ,
- Access Control ,
- Mobile System ,
- Key Control ,
- Detailed Scheme ,
- Dynamic Management ,
- Intrusion Detection System ,
- Security Policy ,
- Design Of Agents ,
- Network Bandwidth ,
- Secret Key ,
- Public Key ,
- Security Management ,
- Digital Signature ,
- Critical Host ,
- Public Parameters ,
- Signature Scheme ,
- Decryption Key