Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.1.017

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme  

Yoo, Seong-Jin (조선대학교 대학원 전자계산학과)
Kim, Seong-Yeol (울산과학대학 컴퓨터정보학부)
Lee, Ok-Bin (조선대학교 대학원 전자계산학과)
Chung, Il-Yong (조선대학교 컴퓨터공학부)
Abstract
Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.
Keywords
Mobile Agent; Digital multi-signature scheme; ID-based key distribution;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Hohi,F., 'An approach to solve the problem fo malicious hosts,' Universitat Stuttart, Fakultat informatik, Fakultatsbericht Nr.
2 Dale,J.and Mamdani,E., 'Open Standards for Interoperating Agent-Based Systems,' Software FOCUS, Wiley, 2001   DOI   ScienceOn
3 Poslad,S, and Calisti,M., 'Towards Improved Trust and Security in FIPA Agent Platforms,' Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies, Spain, 2000
4 Jansen,W. and Karygiannis,T., 'Mobile Agent Security,' NIST Special Publication 800-19, 1988
5 Vigna,G., 'Protecting Mobile Agents through Tracing,' In 3rd ECOOP Workshop on Mobile Object Systems, Proceedings. Lecture Notes In Computer Science 1241 Springer, 1997
6 Bennet,S., 'A Sanctuary for Mobile Agents,' DARPA Workshop on Foundation for Secure Mobile Code Workshop, pp.26-28, 1997
7 백주성, 이동익, '디지털 서명과 감사도구(Audit trail)를 이용한 이동에이전트의 보호', 한국정보과학회 학술발표논문집, 제24권 제2호, 1997
8 Whlhelm,U. and Stamann,S. and Buttyan,L., 'Protecting the itinerary of Mobile Agents,' Workshop on Mobile Object Systems, Proceedings. Lecture Notes In Computer Science, Vol.1543, Springer, 1998
9 박재경, 원유헌, '안전한 이동 에이전트 게이트웨이의 설계및 구현', 한국정보과학회 논문지C, 제8권 제2호, pp.240-249, 2002   과학기술학회마을
10 Ordille, J., 'When agents roam,Who can you trust?,' Proc. of the First Conference on Emerging Technologies and Applications in Communications, Porland, 1996   DOI
11 Riordan,J. and Schneier,B., 'Environmental Key Generation towards Clueless Agents,' Mobile Agents and Security, pp.15-24, Springer-Verlag, 1998
12 Shamir,A., 'Identity-based cryptosystem and signature scheme,' Proc. of CRYPTO 84, pp.47-57, Springer-Verlag, 1985
13 K,Itakura and K.Nakamura, 'A Public-key Cryptosystem Suitable for Digital Multisignature,' NEC J. RES, Dev,71, pp.1-8, 1983
14 K.Ohta and T.Okamoto, 'A Digital Multisignature Scheme Based on the Flat-Shamir Scheme,' Proceedings of Asia crypt'91, pp. 75-79, 1991
15 김승주, 원동호, '특수 디지틀 서명방식에 대한 고찰,' 통신정보보호학회지, 제6권, pp.30-31, 1996   과학기술학회마을
16 T.Okamoto, 'A Digital Multisignature Scheme Using Bijective Public-key Cryptosystems,' ACM Trans. on Comp. systems, Vol.6, No. 8, pp.432-441, 1988   DOI   ScienceOn
17 E.F.Brickell, P.J.Lee and Y. Yacobi, 'Secure Audio Teleconference,' Advances in Cryptology-Cryto'87, Lecture Notes in Computer Science 293, pp.418-426, 1988   DOI