Advanced Search
Volume 26 Issue 9
Sep.  2004
Turn off MathJax
Article Contents
Chen Zhi-xian, Wang Ru-chuan, Wang Shao-di, Sun Zhi-xin. A Secure Transport Model of Mobile Agent Based on Hybrid Encryption[J]. Journal of Electronics & Information Technology, 2004, 26(9): 1407-1412.
Citation: Chen Zhi-xian, Wang Ru-chuan, Wang Shao-di, Sun Zhi-xin. A Secure Transport Model of Mobile Agent Based on Hybrid Encryption[J]. Journal of Electronics & Information Technology, 2004, 26(9): 1407-1412.

A Secure Transport Model of Mobile Agent Based on Hybrid Encryption

  • Received Date: 2003-05-04
  • Rev Recd Date: 2003-08-22
  • Publish Date: 2004-09-19
  • This article analyzes the main security problems that current mobile agent sys-tems face with and existing solving methods, then a secure transport model of mobile agent based on hybrid encryption HESTM is brought forward. The model comprises two parts: (1) Using hybrid encryption encrypt mobile agent; (2) Using TLS encrypts communication channel. The simulation and performance analysis show that HESTM can eiRciently pro-tect the transport security of mobile agent indeed, thus enhance the security and robustness of the whole system. This algorithm has been successfully applied in authors developed prototype-mobile agent based intrusion detection system.
  • loading
  • 王汝传,郑晓燕.移动代理技术及其在电子商务中的应用研究.南京邮电学院学报,2001,21(2):80-81. [2]Fritz Hohl. A protocol to detect malicious hosts attacks by using reference states. Technical Report Nr.09/99, Faculty of Informatics, University of Stuttgart, Germany, 1999.[3]Giovanni Vigna. Cryptographic Traces for Mobile Agents, Mobile Agents and Security, Berlin:Springer-Verlag, 1998, LNCS 1419: 137-153. [4]Fritz Hohl. Time Limited Blackbox Security: Protecting mobile agents from malicious hosts,Mobile Agents and Security, Berlin: Springer-Verlag, 1998, LNCS 1419: 92-113. [5]UWE G. Wilhelm, Sebastian M. Staamann, Levente Buttyan. A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing, 2000, 4(5): 40-48. [6]Dierks T, Allen C. The TLS Protocol. IETF, January 1999. [7]陈鲁生,沈世镒.现代密码学.北京:科学出版社,2002:53-66. [8]赖溪松,韩亮,张真诚.计算机密码学及其应用.北京:国防工业出版社,2001:84-106. [9]Garms J,Somerfield D.Java安全性编程指南.北京:电子工业出版社,2002:48-272. [10]Sander T, Tschudin C F. Towards mobile cryptography. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1998: 215-224. [11]张云勇.移动agent及其应用.北京:清华大学出版社,2002:46-53.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2475) PDF downloads(828) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return