Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A study of securing route structures for mobile agents dispatched in parallel

A study of securing route structures for mobile agents dispatched in parallel For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we first present and discuss five secure route structures for mobile agents dispatched in parallel. These schemes aim to protect the route information against malicious hosts and facilitate the efficient dispatching of a large number of agents, combining public-key encryption and signature schemes and exposing minimal route information to hosts. In terms of security, they are improved one by one. In the 5th structure, nested route and signature structures are adopted in order to detect attacks as early as possible. Meanwhile, the feedback based mechanism is adopted that can enforce the dispatch order to be strictly followed. Additionally, a robustness mechanism with substitute routes is provided for skipping temporarily unreachable hosts to activate descendant agents. Finally, we evaluated our models both analytically and empirically. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png International Journal of Web Engineering and Technology Inderscience Publishers

A study of securing route structures for mobile agents dispatched in parallel

Loading next page...
 
/lp/inderscience-publishers/a-study-of-securing-route-structures-for-mobile-agents-dispatched-in-w9hLSPipAM
Publisher
Inderscience Publishers
Copyright
Copyright © Inderscience Enterprises Ltd. All rights reserved
ISSN
1476-1289
eISSN
1741-9212
Publisher site
See Article on Publisher Site

Abstract

For mobile agents to be effective in practice, they have to be securely and efficiently deployed. In this paper, we first present and discuss five secure route structures for mobile agents dispatched in parallel. These schemes aim to protect the route information against malicious hosts and facilitate the efficient dispatching of a large number of agents, combining public-key encryption and signature schemes and exposing minimal route information to hosts. In terms of security, they are improved one by one. In the 5th structure, nested route and signature structures are adopted in order to detect attacks as early as possible. Meanwhile, the feedback based mechanism is adopted that can enforce the dispatch order to be strictly followed. Additionally, a robustness mechanism with substitute routes is provided for skipping temporarily unreachable hosts to activate descendant agents. Finally, we evaluated our models both analytically and empirically.

Journal

International Journal of Web Engineering and TechnologyInderscience Publishers

Published: Jan 1, 2004

There are no references for this article.