Abstract
Mobile agents are software entities that consist of code, data and state, and that can migrate autonomously from host to host performing some actions on behalf of a user. Security issues restrict the use of code mobility despite its benefits. The protection of mobile agents from the attacks of malicious hosts is considered by far the most difficult security problem to solve in mobile agent systems. In this paper the authors present the implementation and the performance evaluation of a new protocol for detecting suspicious hosts in the mobile agent environment. The protocol is based on limiting the execution time of mobile agents in the executing hosts and was previously presented in [6]. The authors also present how this protocol can improve the usability of the cryptographic traces approach [12].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Java Cryptography Extension (JCE). Institute for Applied Information Processing and Communication of the Graf University of Tecnology, http://jce.iaik.tugraz.at/download/evaluation/index.php
Java Development Kit, http://java.sun.com/downloads/
SourceForge projects, Aglet Software Development Kit (ASDK), http://wwww.sourceforge.net/projects/aglets
Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: IEEE Symposium on Security and Privacy (2001)
Cachin, C., Camenisch, J.L., Kilian, J., Müller, J.: One-round secure computation and secure autonomous mobile agents. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, p. 512. Springer, Heidelberg (2000)
Esparza, O., Soriano, M., Muñoz, J.L., Forné, J.: A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. In: IEEE Symposium on Computers and Communications - ISCC 2003 (2003)
Esparza, O., Soriano, M., Muñoz, J.L., Forné, J.: Host Revocation Authority: a Way of Protecting Mobile Agents from Malicious Hosts. In: Cueva Lovelle, J.M., Rodríguez, B.M.G., Gayo, J.E.L., Ruiz, M.d.P.P., Aguilar, L.J. (eds.) ICWE 2003. LNCS, vol. 2722, Springer, Heidelberg (2003)
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 92. Springer, Heidelberg (1998)
Riordan, J., Schneier, B.: Environmental Key Generation Towards Clueless Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 15. Springer, Heidelberg (1998)
Roth, V.: Mutual protection of cooperating agents. In: Secure Internet Programming: Security Issues for Mobile and Distributed Objects. LNCS, vol. 1906, Springer, Heidelberg (1999)
Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 44. Springer, Heidelberg (1998)
Vigna, G.: Cryptographic traces for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, p. 137. Springer, Heidelberg (1998)
Yee, B.S.: A sanctuary for mobile agents. In: DARPA workshop on foundations for secure mobile code (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Esparza, O., Soriano, M., Muñoz, J.L., Forne, J. (2003). Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. In: Horlait, E., Magedanz, T., Glitho, R.H. (eds) Mobile Agents for Telecommunication Applications. MATA 2003. Lecture Notes in Computer Science, vol 2881. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39646-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-39646-8_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20298-1
Online ISBN: 978-3-540-39646-8
eBook Packages: Springer Book Archive