[vc_empty_space][vc_empty_space]
Mobile-agent’s self-reliant host security examination
Irwana, Langi A.Z.R.a, Husni E.a
a School of Electrical Engineering and Informatics, Institut Teknologi Bandung, Bandung, Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2015 IEEE.Mobile agent brings new concept on programming, especially on distributed computing paradigm. It attracts great interest because of its mobility, autonomy and persistence. But it also brings security issues i.e. insecure networks, malicious agents, malicious hosts and malicious users. One most difficult issues is protecting mobile agent from malicious host because mobile agent execute its code on host so that host can do many things to manipulate data, code and control flow of mobile agent. This paper proposes mobile-agent’s self-reliant host security examination so that mobile agent is able to identify malicious host. In this proposed scheme, every hosts must have signature in blinded form in order to ensure unauthorized host cannot use this signature. This signature serves to distinguish malicious hosts with trusted host. When mobile agent arrives at new host, it will check validation of host’s signature. Mobile agent also gives challenge to host, and host has to give a valid response. If host cannot give valid signature and response, mobile agent will identify this host as malicious host and return to its previous host. Zero knowledge proof of knowledge is used on challenge-response phase so that private keys cannot be revealed.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Blind signatures,Challenge response,Insecure networks,Malicious agent,Malicious host,proof of knowledge,Security issues,Zero knowledge proof[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]blind signature,malicious host,mobile agent,proof of knowledge[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICITSI.2015.7437711[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]