Boosting m-business using a truly secured protocol for data gathering mobile agents

Raja Al-Jaljouli
{"title":"Boosting m-business using a truly secured protocol for data gathering mobile agents","authors":"Raja Al-Jaljouli","doi":"10.1109/ICMB.2005.23","DOIUrl":null,"url":null,"abstract":"The paper focuses on the security issue of employing mobile agents in m-business. The trustworthiness of mobile agents is crucial to the success of m-business. To be trustworthy, a mobile agent must protect its gathered data against adversaries encountered while traversing the Internet. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals security flaws, such as truncation, alteration, or breach of privacy of gathered data. We present an accurate security protocol for data gathering mobile agents. The protocol uses co-operating agents, performs verifications during agent's lifecycle in addition to the verifications upon agent's return to the originator. It also implements special security techniques on the top of the common techniques, which would rectify revealed flaws. We prove its correctness by verifying the security properties: authenticity, confidentiality, and strong integrity using STA, an infinite-state exploration formal method.","PeriodicalId":275276,"journal":{"name":"International Conference on Mobile Business (ICMB'05)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Mobile Business (ICMB'05)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMB.2005.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

The paper focuses on the security issue of employing mobile agents in m-business. The trustworthiness of mobile agents is crucial to the success of m-business. To be trustworthy, a mobile agent must protect its gathered data against adversaries encountered while traversing the Internet. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals security flaws, such as truncation, alteration, or breach of privacy of gathered data. We present an accurate security protocol for data gathering mobile agents. The protocol uses co-operating agents, performs verifications during agent's lifecycle in addition to the verifications upon agent's return to the originator. It also implements special security techniques on the top of the common techniques, which would rectify revealed flaws. We prove its correctness by verifying the security properties: authenticity, confidentiality, and strong integrity using STA, an infinite-state exploration formal method.
使用真正安全的协议来收集移动代理的数据,促进移动商务
本文主要研究移动商务中使用移动代理的安全问题。移动代理的可信度对移动商务的成功至关重要。为了值得信赖,移动代理必须保护其收集的数据,防止在穿越Internet时遇到对手。文献中提出了几种加密协议,以保证收集数据的安全性。协议的正式验证揭示了安全缺陷,例如截断、更改或泄露所收集数据的隐私。我们提出了一个准确的安全协议的数据收集移动代理。该协议使用协作代理,除了在代理返回发起者时进行验证外,还在代理的生命周期内执行验证。它还在常用技术的基础上实现了特殊的安全技术,这将纠正暴露的缺陷。我们通过使用STA(一种无限状态探索形式化方法)验证其安全性:真实性、机密性和强完整性来证明其正确性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信