Font Size: a A A

Research On The Security Problem Of Mobile Agent In Malicious Environment

Posted on:2005-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:X ChengFull Text:PDF
GTID:2178360182975221Subject:Computer applications
Abstract/Summary:PDF Full Text Request
Along with the development of Internet, the resources become fruitful rich, theperformance and the reliability of network connection become unstable. Obviously,RPC technology, based on LAN, lacks of individuality, flexibility, and is unsuitableunder this condition. Therefore, a more advanced computation mode is needed fornetwork computation of Internet. Mobile Agent technology emerges under thisbackground.A mobile agent can migrate independently and can move individualitycomputation to the server where resources exist, it has following advantages: open,flexibility, robustness, scalability, efficiency, and supporting mobile customer.However, because mobile agent system supports mobile agents to migrateindependently, mobile agents are facing serious security threat. If this problem can'tbe solved, it will be impossible to apply this technology in those areas that needsecurity.On the basis of Vigna's Reference State Protocol, this dissertation addresses toestablish a security protocol-TRIP (Tracing Results and Inputs Protocol), whichtracing a mobile agent's results and inputs, to solve various kinds of problems that amobile agent may be met while running in malicious environment. The solution usestransitive digital signature technology to hide and verify a mobile agent's route.Furthermore, this dissertation proposes a security solution for mobile agents to signdigital signature in malicious hosts using CEF (Computing with Encrypted Function)technology. The solution can prevent a malicious host to spy on agent's private dataand abuse the digital signature.
Keywords/Search Tags:software agent, mobile agent, the problem of malicious hosts, digital signature
PDF Full Text Request
Related items