A scheme for protecting mobile agents based on combining obfuscated data and time checking technology

被引:0
|
作者
Wu, Jiehong [1 ]
Chang, Guiran [1 ]
Li, Jia [1 ]
机构
[1] Northeastern Univ, Informat Sci & Engn Inst, Shenyang, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile agents are programs that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. In most applications, the security of mobile agents is of the utmost importance. Obfuscation is a technique in which the mobile code producer enforces the security policy by applying a behavior transformation to the code before sending it to run on different platforms. This paper presents a protection scheme of mobile agent in network application, which combining obfuscated data and time checking technology to verify the security of node. How to obtain important data in time checking is given also. The protection scheme is tested in actual network management environment, which can effectively identify the malicious node.
引用
收藏
页码:221 / 224
页数:4
相关论文
共 50 条
  • [1] A scheme for protecting mobile agents based on combining obfuscated control flow and time checking technology
    Wu, Jiehong
    Zhang, Yujie
    Wang, Xiaowei
    Chang, Guiran
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 912 - +
  • [2] The study for protecting mobile agents based on time checking technology
    Wu, Jiehong
    Guo, Xiaochun
    Tian, Cuihua
    Yin, Hang
    Chang, Guiran
    2007 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND BIOMIMETICS, VOLS 1-5, 2007, : 2013 - +
  • [3] Study of mobile agent protection based on data obfuscation and time checking
    Wu, Jiehong
    Chang, Guiran
    Gao, Fuxiang
    Yin, Hang
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (03): : 363 - 369
  • [4] A new data protecting scheme based on TPM
    Xu, Mingdi
    He, Jian
    Zhang, Bo
    Zhang, Huanguo
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 943 - +
  • [5] Dual Watermarking Scheme Based on IWT for Checking Image Integrity and Protecting Copyright
    Ernawan, Ferda
    Hafidz, Muhammad Afnan
    Raffei, Anis Farihan Mat
    9TH INTERNATIONAL CONFERENCE ON MECHATRONICS ENGINEERING, ICOM 2024, 2024, : 390 - 395
  • [6] Research on Preprocessing Technology of Power Mobile Data Collection Based on Distributed Agents
    Dai, Zaojian
    Chen, Mu
    Li, Yong
    2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, : 61 - 64
  • [7] Protecting mobile rule-based agents through rete obfuscation
    Grove, R
    PROCEEDINGS OF THE ISCA 12TH INTERNATIONAL CONFERENCE INTELLIGENT AND ADAPTIVE SYSTEMS AND SOFTWARE ENGINEERING, 2003, : 16 - 19
  • [8] Data protection in mobile agents; one-time key based approach
    Park, JY
    Lee, DI
    Lee, HH
    5TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2001, : 411 - 418
  • [9] A SECURE TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME BASED ON ECC FOR MOBILE AGENTS
    Huang, Jen-Yan
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Liao, I-En
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (05): : 2159 - 2170
  • [10] Design and Analysis of a Data Fusion Scheme in Mobile Wireless Sensor Networks Based on Multi-Protocol Mobile Agents
    Wu, Chunxue
    Wu, Wenliang
    Wan, Caihua
    Bekkering, Ernst
    Xiong, Naixue
    SENSORS, 2017, 17 (11)