A scheme for protecting mobile agents based on combining obfuscated data and time checking technology

被引:0
|
作者
Wu, Jiehong [1 ]
Chang, Guiran [1 ]
Li, Jia [1 ]
机构
[1] Northeastern Univ, Informat Sci & Engn Inst, Shenyang, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile agents are programs that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. In most applications, the security of mobile agents is of the utmost importance. Obfuscation is a technique in which the mobile code producer enforces the security policy by applying a behavior transformation to the code before sending it to run on different platforms. This paper presents a protection scheme of mobile agent in network application, which combining obfuscated data and time checking technology to verify the security of node. How to obtain important data in time checking is given also. The protection scheme is tested in actual network management environment, which can effectively identify the malicious node.
引用
收藏
页码:221 / 224
页数:4
相关论文
共 50 条
  • [11] A FPGA-Based Scheme for Protecting Weapon System Software Technology
    Jang, Minhae
    Ryu, Yeonseung
    Park, Hyunkyoo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT V, 2018, 10964 : 148 - 157
  • [12] OPTIMIZING TURNAROUND TIME FOR MOBILE AGENTS IN CENTRALIZED KEY SERVER SCHEME
    Malik, Najmus Saqib
    Ziauddin, Sheikh
    PROCEEDINGS OF THE 2011 3RD INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (ICFCC 2011), 2011, : 225 - 230
  • [13] Multiple Replica based Remote Data Possession Checking Scheme based on Matrix Representation of Data
    Balamurugan, B.
    Mandadi, Akhil Reddy
    Mohan, Sabana
    Faahtheima, Sherein
    INTERNATIONAL CONFERENCE ON INNOVATION INFORMATION IN COMPUTING TECHNOLOGIES, 2015, 2015,
  • [14] A fault-tolerant voting scheme based on mobile agents
    Robles, S
    Borrell, J
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS III, 2002, : 126 - 131
  • [15] An enhanced Data Possession Checking scheme using Identity Based Signature
    Thayaambika, M.
    Rajakumar, Solomon Sylvia
    Kalpana, V.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 941 - 944
  • [16] Intelligent Data Acquisition Technology Based on Agents
    Y. M. Hu
    R. S. Du
    S. Z. Yang
    The International Journal of Advanced Manufacturing Technology, 2003, 21 : 866 - 873
  • [17] Intelligent data acquisition technology based on agents
    Hu, YM
    Du, RS
    Yang, SZ
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2003, 21 (10-11): : 866 - 873
  • [18] Intelligent Data Acquisition Technology Based on Agents
    Hu, Y.M. (youmh@netease.com), 1600, Springer-Verlag London Ltd (21): : 10 - 11
  • [20] Hierarchical key management scheme for securing mobile agents with optimal computation time
    Vijayakumar, P.
    Anand, K.
    Bose, S.
    Maheswari, V.
    Kowsalya, R.
    Kannan, A.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 1432 - 1443