Research Output
Protecting mobile agents from external replay attacks
  This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solutions is that they do not allow the agent to perform legal migrations to the same platform several times. The aim of this paper is to address these issues by presenting a novel solution based on authorisation entities, which allow the agent to be reexecuted on the same platform a number of times determined at runtime. The proposed protocol is secure under the assumption that authorisation entities are trusted.

  • Type:

    Article

  • Date:

    28 February 2009

  • Publication Status:

    Published

  • Publisher

    Elsevier

  • DOI:

    10.1016/j.jss.2008.05.018

  • Cross Ref:

    S0164121208001283

  • ISSN:

    0164-1212

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    621.3821 Communications networks

Citation

Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009). Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018

Authors

Keywords

Mobile agents; security; malicious hosts; replay attacks; trip marker; protected itinerary;

Monthly Views:

Available Documents