Browse > Article

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS  

Jung Chang-Ryul (순천대학교 컴퓨터과학과 DB&EC 연구실)
Yoon Hong-Sang (광주대학교 컴퓨터정보통신공학부)
Abstract
This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.
Keywords
Agent; Digital Signature; Authentication; Integrity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Borselius, C. J. Mitchell, and A. Wilson, 'On the Value of Threshold Signature,' in Proceeding ACM SIGOPS Operating Systems Review, Vol. 34, No. 4, pp.30-35, 2002   DOI
2 H. K. Tan and L. Moreau, 'Certificates for Mobile Code Security,' in Proceedings of the 17th ACM Symposium on Applied Computing, March 2002
3 V. Shoup, 'Practical threshold signa- tures,' In B. Preneel(Ed.), Advances in Cryptology EUROCRYPT 2000, LNCS 1807, pp.207-220. Springer-Verlag, 2000
4 P. Kotzanikolaou, M. Burmester, and V. Chrissikpoulos, 'Secure Transactions with Mobile Agents in Hostile Environments,' in E. Dawson et al. (Ed.s), Information Security and Privacy, in Proceedings of the 5th Australasian Conference ACISP 2000, LNCS 1841, pp.289-297, Springer-verlag, 2000
5 T. Sander, and C. Tschudin, 'Protecting Mobile Agents Against Malicious Hosts,' in G. Vigna(Ed.), Mobile Agents and Security, LNCS1419, pp.44-60, Springer-verlag, 1998
6 C. R. Jung, 'A Framework of Agent Protection Protocol for Secure Execution of Mobile Agent,' in Journal of KIMICS, Vol. 8, No. 2, pp. 371-378, 2004   과학기술학회마을
7 H. K. Tan, and L. Moreau, 'Extending Execution Tracing for Mobile Code Security,' K. Fischer, D. Hutter(Eds), in Proceeding of the 2nd International Workshop on Security in Mobile Multi-Agent Systems(SEMAS'2002), DFKI Research Report(RR-02-03), pp.51-59, 2002
8 박종열, 이동익, 이형효, 박중길, '이동 에이전트의 데이터 보호를 위한 일회용 에이전트 키생성 시스템', 한국정보과학회논문지:정보통신 제28권, 제3호, pp.309-320, 2001
9 N. M. Karnik, A. R. Tripathi, 'Security in the Ajanta Mobile Agent System,' Technical Report TR-5-99, University of Minnesota, Minneapolis, MN 55455, U.S.A., May, 1999