Transporting mobile code with internal authentication and tamper detection

被引:0
|
作者
Marvel, LM [1 ]
Baur, EH [1 ]
Hartwig, GW [1 ]
机构
[1] USA, Res Lab, Comp & Informat Sci Directorate, Comp & Commun Sci Div, Aberdeen Proving Ground, MD 21005 USA
关键词
mobile code; Internet; security; authentication;
D O I
10.1117/12.438307
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile code opens a world of possibilities for Battlespace digitization. However, due to security issues associated with transporting code over such networks, mobile code in the battlefield may present serious risks. Attackers may attempt to thwart the end-user's mission by manipulating or destroying code prior to its final destination. To combat such acts, we propose an authentication method that can reside on any Internet server/client without the typical constraints that exist for firewalls and certificates. Our method consists of the construction of a digital signature at the server based on the characteristics of the mobile code itself. This signature, or mark, is then embedded within the code in a hidden manner using steganographic methods. Upon receipt of the mobile code, the client can use the key to extract the embedded mark and regenerate a mark from the received code. The two marks are compared to verify the integrity of the code and the authenticity of the sender. This technique is implemented for HTML code and the effectiveness of tamper detection is demonstrated. Mobile code authentication techniques, such as this, can provide the security necessary to permit the exploitation of this powerful computing medium on the networked battlefield.
引用
收藏
页码:108 / 115
页数:8
相关论文
共 50 条
  • [31] Ownership Authentication and Tamper Detection in Digital Images via Zero-Watermarking
    Morales-Ortega, Adrian
    Cedillo-Hernandez, Manuel
    2022 45TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING, TSP, 2022, : 122 - 125
  • [32] Compatible 2D-code having tamper detection system with QR-code
    Ishihara, Takayuki
    Niimi, Michiharu
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 493 - 496
  • [33] Mobile authentication of copy detection patterns
    Taran, Olga
    Tutt, Joakim
    Holotyak, Taras
    Chaban, Roman
    Bonev, Slavi
    Voloshynovskiy, Slava
    EURASIP JOURNAL ON INFORMATION SECURITY, 2023, 2023 (01)
  • [34] Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System
    Yan, Liang
    Guo, Hongbo
    Chen, Min
    Rong, Chunming
    Leung, Victor
    NETWORKING 2011 WORKSHOPS, 2011, 6827 : 243 - +
  • [35] An image-adaptive semi-fragile watermarking for image authentication and tamper detection
    Yang, Hengfu
    Sun, Xingming
    Wang, Bin
    Qin, Zheng
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 3, PROCEEDINGS, 2007, 4707 : 1066 - +
  • [36] Semi-fragile watermarking for image authentication and tamper detection using HVS model
    Yang, Hengfu
    Sun, Xingming
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1112 - +
  • [37] Watermarking based image authentication and tamper detection algorithm using vector quantization approach
    Tiwari, Archana
    Sharma, Manisha
    Tamrakar, Raunak Kumar
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2017, 78 : 114 - 123
  • [38] Digital watermarking for telltale tamper proofing and authentication
    Kundur, D
    Hatzinakos, D
    PROCEEDINGS OF THE IEEE, 1999, 87 (07) : 1167 - 1180
  • [39] A tamper-proof and lightweight authentication scheme
    Hammouri, Ghaith
    Ozturk, Erdinc
    Sunar, Berk
    PERVASIVE AND MOBILE COMPUTING, 2008, 4 (06) : 807 - 818
  • [40] Correction: Mobile authentication of copy detection patterns
    Olga Taran
    Joakim Tutt
    Taras Holotyak
    Roman Chaban
    Slavi Bonev
    Slava Voloshynovskiy
    EURASIP Journal on Information Security, 2023