Transporting mobile code with internal authentication and tamper detection

被引:0
|
作者
Marvel, LM [1 ]
Baur, EH [1 ]
Hartwig, GW [1 ]
机构
[1] USA, Res Lab, Comp & Informat Sci Directorate, Comp & Commun Sci Div, Aberdeen Proving Ground, MD 21005 USA
关键词
mobile code; Internet; security; authentication;
D O I
10.1117/12.438307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile code opens a world of possibilities for Battlespace digitization. However, due to security issues associated with transporting code over such networks, mobile code in the battlefield may present serious risks. Attackers may attempt to thwart the end-user's mission by manipulating or destroying code prior to its final destination. To combat such acts, we propose an authentication method that can reside on any Internet server/client without the typical constraints that exist for firewalls and certificates. Our method consists of the construction of a digital signature at the server based on the characteristics of the mobile code itself. This signature, or mark, is then embedded within the code in a hidden manner using steganographic methods. Upon receipt of the mobile code, the client can use the key to extract the embedded mark and regenerate a mark from the received code. The two marks are compared to verify the integrity of the code and the authenticity of the sender. This technique is implemented for HTML code and the effectiveness of tamper detection is demonstrated. Mobile code authentication techniques, such as this, can provide the security necessary to permit the exploitation of this powerful computing medium on the networked battlefield.
引用
收藏
页码:108 / 115
页数:8
相关论文
共 50 条
  • [21] A NEW MOBILE WIDGET ALGORITHM USED TO RESIST TAMPER BASED ON CODE SIGNATURE
    Tong, Li-xia
    He, Jia-ming
    Chen, Ken
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 243 - 246
  • [22] Benchmarking Message Authentication Code Functions for Mobile Computing
    Rashwan, A. M.
    Taha, A-E M.
    Hassanein, H. S.
    2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012,
  • [23] An efficient low bit rate image watermarking and tamper detection for image authentication
    Md. Ahasan Kabir
    SN Applied Sciences, 2021, 3
  • [24] Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern
    Lin, Chih-Hung
    Chen, Tzung-Her
    Chiu, Chun-Wei
    DISPLAYS, 2013, 34 (01) : 59 - 68
  • [25] An efficient low bit rate image watermarking and tamper detection for image authentication
    Kabir, Md. Ahasan
    SN APPLIED SCIENCES, 2021, 3 (04):
  • [26] Watermarking Algorithm for Tamper Detection and Recovery of E-Invoice Proof Authentication
    Yin B.
    Chen F.
    He H.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2018, 46 (05): : 68 - 77
  • [27] An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images
    Madhushree, B.
    Kumar, H. B. Basanth
    Chennamma, H. R.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (13) : 39779 - 39821
  • [28] An exhaustive review of authentication, tamper detection with localization and recovery techniques for medical images
    B. Madhushree
    H. B. Basanth Kumar
    H. R. Chennamma
    Multimedia Tools and Applications, 2024, 83 : 39779 - 39821
  • [29] Spatial digital watermark for MPEG-2 video authentication and tamper detection
    Winne, DA
    Knowles, HD
    Bull, DR
    Canagarajah, CN
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3457 - 3460
  • [30] Server-based code obfuscation scheme for APK tamper detection
    Piao, Yuxue
    Jung, Jin-Hyuk
    Yi, Jeong Hyun
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 457 - 467