Skip to main content
Log in

Secure Transmission of Mobile Agent in Dynamic Distributed Environments

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Huang et al. has recently proposed an efficient key management and access control scheme for mobile agent environments based on Elliptic Curve Cryptosystem (ECC). Although their scheme provides superior efficiency in comparison with the previous works, however some active attacks threaten its security. In this paper a new dynamic key management scheme based on ECC is proposed that is secure and also is efficient in computation cost. Analyzing the security criteria and performance confirms suitability of the proposed scheme for mobile agent environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Lin I. C., Ou H. H., Hwang M. S.: Efficient access control and key management schemes for mobile agents. Computer Standards & Interfaces 26(5), 423–433 (2004)

    Article  Google Scholar 

  2. Lange D. B., Oshima M.: Programming and deploying Java mobile agents with aglets. Addison-Wesley Press, Massachusetts, USA (1998)

    Google Scholar 

  3. Gian P. P.: Mobile agents: An introduction. Microprocessors and Microsystems 25(2), 65–74 (2001)

    Article  Google Scholar 

  4. Biskup J., Embley D. W., Lochner J. H.: Reducing inference control to access control for normalized database schemas. Information Processing Letters 106, 8–12 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  5. Esparza O., Muñoz J. L., Soriano M., Forné J.: Secure brokerage mechanisms for mobile electronic commerce. Computer Communications 29(12), 2308–2321 (2006)

    Article  Google Scholar 

  6. Chung Y. F., Chen Y. T., Chen T. L., Chen T. S.: An agent-based English auction protocol using elliptic curve cryptosystem for mobile commerce. Expert Systems with Applications 38(8), 9900–9907 (2011)

    Article  Google Scholar 

  7. Nikooghadam M., Zakerolhosseini A.: An efficient blind signature scheme based on the elliptic curve discrete logarithm problem. The ISC International Journal of Information Security 1(2), 125–131 (2009)

    Google Scholar 

  8. Saxena N., Tsudik G., Yi J. H.: Threshold cryptography in P2P and MANETs: The case of access control. Computer Networks 51(12), 3632–3649 (2007)

    Article  MATH  Google Scholar 

  9. Orgun B., Vu J.: HL7 ontology and mobile agents for interoperability in heterogeneous medical information systems. Computers in Biology and Medicine 36(7–8), 817–836 (2006)

    Article  Google Scholar 

  10. Wu S., Chen K. (2011) An efficient key-management scheme for hierarchical access control in E-medicine system. Journal of Medical Systems. doi:10.1007/s10916-011-9700-7.

  11. Lin I. C., Ou H. H., Hwang M. S.: Two secure transportation schemes for mobile agents. Information Security: An International Journal 8(1), 87–97 (2002)

    Google Scholar 

  12. Corradi, A., Montanari, R., & Stefanelli, C. (1999). Security issues in mobile agent technology. In Proceedings of the 7th IEEE workshop on future trends of distributed computing systems (FTDCS ‘99), IEEE Computer Society Press, Cape Town, South Africa, pp. 3–8.

  13. Karnik, N. M., & Tripathi, A. R. (2000). A security architecture for mobile agents in Ajanta. In Proceedings of the international conference on distributed computing systems, Taipei, Taiwan, pp. 402–409.

  14. Volker R., Mehrdad J. S.: Access control and key management for mobile agents. Computers Graphics 22(4), 457–461 (1998)

    Article  Google Scholar 

  15. Chang C. C., Lin I. C.: A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6, 137–146 (2006)

    Article  Google Scholar 

  16. Huang K. H., Chung Y. F., Liu C. H., Lai F., Chen T. S.: Efficient migration for mobile computing in distributed networks. Computer Standards Interfaces 31(1), 40–47 (2009)

    Article  Google Scholar 

  17. Vanstone S. A.: Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Information Security Technical Report 2(2), 78–87 (1997)

    Article  MathSciNet  Google Scholar 

  18. Stallings W.: Cryptography and network security, principles and practice (3rd ed.). Prentice Hall, Englewood Cliffs (2005)

    Google Scholar 

  19. Halunga S. V., Vizireanu N.: Performance evaluation for conventional and MMSE multiuser detection algorithms in imperfect reception conditions. Digital Signal Processing 20, 166–178 (2010)

    Article  Google Scholar 

  20. Halunga S. V., Vizireanu N., Fratu O.: Imperfect cross-correlation and amplitude balance effects on conventional multiuser decoder with turbo encoding. Digital Signal Processing 20, 191–200 (2010)

    Article  Google Scholar 

  21. Abdulah Zadeh, A. (2007). High speed modular divider based on GCD algorithm, Lecture notes in computer science. In Information and Communications Security (Vol. 4861, pp. 189–200).

  22. Knuth, D. E. (1998). The art of computer programming, Semi numerical algorithms (3rd ed., Vol. 2). Reading, MA: Addison-Wesley.

  23. Menezes A. J., Orschot P. C., Vanstone S. A.: Hand-Book of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  24. Nikooghadam M., Zakerolhosseini A., Ebrahimi Moghadam M.: Efficient utilization of elliptic curve cryptosystem for hierarchical access control. The Journal of Systems and Software 83(10), 1917–1929 (2010)

    Article  Google Scholar 

  25. Nikooghadam M., Bonyadi M. R., Malekian E., Zakerolhosseini A.: A protocol for digital signature based on the elliptic curve discrete logarithm problem. Journal of Applied Sciences 8(10), 1919–1925 (2008)

    Article  Google Scholar 

  26. Nikooghadam, M, Safaei, F. & Zakerolhosseini, A. (2010). An efficient key management scheme for mobile agents in distributed networks, In IEEE, 1st international conference on parallel, distributed and grid computing.

  27. Ben-Or, M. (1981). Probabilistic algorithms in finite fields. In 22nd annual symposium on foundations of computer science (IEEE FOCS’81), pp. 394–398.

  28. Cohen H.: A course in computational algebraic number theory. Springer, Berlin (1991)

    Google Scholar 

  29. Lin Y. L., Hsu C. L.: Secure key management scheme for dynamic hierarchical access control based on ECC. The Journal of Systems and Software 84(4), 679–685 (2011)

    Article  Google Scholar 

  30. Eslami Z., Talebi M.: A new untraceable off-line electronic cash system. Electronic Commerce Research and Applications 10(1), 59–66 (2011)

    Article  Google Scholar 

  31. Koblitz N., Menezes A., Vanstone S. A.: The state of elliptic curve cryptography. Designs, Codes, and Cryptography 19(2), 173–193 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  32. Schmalisch, M., & Timmermann, D. (2003). A reconfigurable arithmetic logic unit for elliptic curve cryptosystems over GF (2m). In The 46th IEEE international midwest symposium on circuit and systems, Vol. 2, pp. 831–834.

  33. Zakerolhosseini, A., & Nikooghadam M. (2012, in press). Low-power and high-speed design of a versatile bit-serial multiplier in finite fields GF (2m). Integration the VLSI Journal doi:10.1016/j.vlsi.2012.03.001.

  34. Lin P., Chen H. Y., Fang Y., Jeng J. Y., Lu F. S.: A secure mobile electronic payment architecture platform for wireless mobile networks. IEEE Transactions on Wireless Communications 7(7), 2705–2713 (2008)

    Article  Google Scholar 

  35. Yang, J. H., & Chang, C. C. (2010). A low computational-cost electronic payment scheme for mobile commerce with large-scale mobile users. Wireless Personal Communication. doi:10.1007/s11277-010-0109-2, pp. 83–99.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Morteza Nikooghadam.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zakerolhosseini, A., Nikooghadam, M. Secure Transmission of Mobile Agent in Dynamic Distributed Environments. Wireless Pers Commun 70, 641–656 (2013). https://doi.org/10.1007/s11277-012-0712-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-012-0712-5

Keywords

Navigation