A scheme for protecting mobile agents based on combining obfuscated data and time checking technology

被引:0
|
作者
Wu, Jiehong [1 ]
Chang, Guiran [1 ]
Li, Jia [1 ]
机构
[1] Northeastern Univ, Informat Sci & Engn Inst, Shenyang, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile agents are programs that travel autonomously through a computer network in order to perform some computation or gather information on behalf of a human user or an application. In most applications, the security of mobile agents is of the utmost importance. Obfuscation is a technique in which the mobile code producer enforces the security policy by applying a behavior transformation to the code before sending it to run on different platforms. This paper presents a protection scheme of mobile agent in network application, which combining obfuscated data and time checking technology to verify the security of node. How to obtain important data in time checking is given also. The protection scheme is tested in actual network management environment, which can effectively identify the malicious node.
引用
收藏
页码:221 / 224
页数:4
相关论文
共 50 条
  • [21] A data processing scheme based on CXML in mobile commerce
    Shi, Shengbo
    Zhang, Runtong
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2016, 16 (04) : 913 - 925
  • [22] Privacy-Protecting Reputation Management Scheme in IoV-based Mobile Crowdsensing
    Wang, Zhifei
    Liu, Luning
    Wang, Luhan
    Wen, Xiangming
    Jing, Wenpeng
    2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 337 - 343
  • [23] Dummy-Based Approach for Protecting Mobile Agents Against Malicious Destination Machines
    Alluhaybi, Bandar
    Alrahhal, Mohamad Shady
    Alzahrani, Ahmed
    Thayananthan, Vijey
    IEEE ACCESS, 2020, 8 : 129320 - 129337
  • [24] Overlay Ring Based Secure Group Communication Scheme for Mobile Agents
    Jang, Hyunsu
    Ko, Kwang Sun
    Jung, Young-woo
    Eom, Young Ik
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2009, PT II, 2009, 5593 : 302 - +
  • [25] Cognitive agents based authentication & privacy scheme for mobile transactions (CABAPS)
    Babu, B. Sathish
    Venkataram, P.
    COMPUTER COMMUNICATIONS, 2008, 31 (17) : 4060 - 4071
  • [26] A hierarchical access control scheme based on Lagrange interpolation for mobile agents
    Hsiao, Tsung-Chih
    Wu, Zhen-Yu
    Chen, Tzer-Long
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (07):
  • [27] A Dual Combining based Decoding Scheme for Two-Branched Mobile STBC
    Wee, Jungwook
    Jeon, Wongi
    Park, Kyungwon
    Kim, Hyunsik
    Cho, Yongsoo
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2008, 54 (04) : 1635 - 1639
  • [28] Study of MA protection based on Homomorphism Encryption and Time Checking Technology
    Wu, Jiehong
    Zhang, Po
    Wang, Bin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (05): : 51 - 56
  • [29] The Use of Blockchain Technology for Private Data Handling for Mobile Agents in Human-Technology Interaction
    Kirks, Thomas
    Uhlott, Tim
    Jost, Jana
    PROCEEDINGS OF THE IEEE 2019 9TH INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (CIS) ROBOTICS, AUTOMATION AND MECHATRONICS (RAM) (CIS & RAM 2019), 2019, : 445 - 450
  • [30] MAWA: An efficient and reliable web access scheme in mobile wireless environments based on mobile agents
    Hu, Haiyang
    Hu, Hua
    Ling, Yun
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2008, 45 (04): : 636 - 645