{"title":"Group Oriented Secure Routing Protocol of Mobile Agents","authors":"Weidong Qiu, Haibin Guan, Xinghao Jiang, Zheng Huang","doi":"10.1109/CIS.WORKSHOPS.2007.17","DOIUrl":null,"url":null,"abstract":"Security is an important issue for the widespread deployment of applications based on software agent technology. Group signature is integrated into secure routing protocol for mobile agents in this paper. The hosts visited by mobile agent are in different groups. The structure of group oriented routing protocol is more clear and nature. Besides, by building trust policies, the risk and loss of DoS attack will be minimized. Furthermore, if DoS attack happens unfortunately, the protocol can identify the malicious host launching the DoS attack. According to the behavior of hosts in past, we can either define an appropriate order in which selected hosts should be visited, or decide which hosts we do not want to contact again.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Security is an important issue for the widespread deployment of applications based on software agent technology. Group signature is integrated into secure routing protocol for mobile agents in this paper. The hosts visited by mobile agent are in different groups. The structure of group oriented routing protocol is more clear and nature. Besides, by building trust policies, the risk and loss of DoS attack will be minimized. Furthermore, if DoS attack happens unfortunately, the protocol can identify the malicious host launching the DoS attack. According to the behavior of hosts in past, we can either define an appropriate order in which selected hosts should be visited, or decide which hosts we do not want to contact again.