This paper proposes a new method of data authentication and encryption for distributed networks supporting mobile software agents. Software agents are a valuable instrument in wireless distributed monitoring networks, since they can be used to concentrate the monitoring effort in certain areas where an event is taking place. This way events can be tracked in a dynamic and efficient way. Mobile agents have to send messages to each other in order to coordinate their action, and those messages need to be secured by crypto credentials. But when the agents are moved over a wireless networks, how can the credentials be protected from sniffing by an attacker, besides layer II encryption? And if a rogue agent is injected in the network is it possible to limit the damages it can produce? The proposed approach bridges mediated RSA with the trusted platform modules (TPM) in order to provide an efficient and secure communication between agents. The communication is secured using ID-based cryptography while maintaing the compatibility with standard RSA and eliminating the mediator introduced by mRSA. We will show that this approach is convenient in terms of traffic overhead, perfectly applicable to existing TPM specifications and able to limit the damage that both an external and an internal attacker can produce to the network

This paper proposes a new method of data authentication and encryption for distributed networks supporting mobile software agents. Software agents are a valuable instrument in wireless distributed monitoring networks, because they can be used to concentrate monitoring efforts in certain areas where an event is taking place. In this way, events can be tracked in a dynamic and efficient way. Mobile agents have to send messages to each other in order to coordinate their actions, and those messages need to be secured by crypto credentials. However, when agents are moved over wireless networks, how can credentials be protected from sniffing by an attacker, besides layer II encryption? Moreover, if a rogue agent is injected in the network, is it possible to limit the damages it can produce? The proposed approach bridges mediated RSA with the trusted platform modules, in order to provide an efficient and secure communication between agents. The communication is secured using indeed Identity based cryptography, while maintaing the compatibility with standard RSA and eliminating the mediator introduced by mediated RSA. We will show that this approach is convenient in terms of traffic overhead, perfectly applicable to existing trusted platform modules specifications and able to limit damages that both external and internal attackers can produce to the network.

Protecting mobile agents communications in pervasive networks with a trusted distributed mediator for ID-based RSA

Maccari, Leonardo;
2014-01-01

Abstract

This paper proposes a new method of data authentication and encryption for distributed networks supporting mobile software agents. Software agents are a valuable instrument in wireless distributed monitoring networks, because they can be used to concentrate monitoring efforts in certain areas where an event is taking place. In this way, events can be tracked in a dynamic and efficient way. Mobile agents have to send messages to each other in order to coordinate their actions, and those messages need to be secured by crypto credentials. However, when agents are moved over wireless networks, how can credentials be protected from sniffing by an attacker, besides layer II encryption? Moreover, if a rogue agent is injected in the network, is it possible to limit the damages it can produce? The proposed approach bridges mediated RSA with the trusted platform modules, in order to provide an efficient and secure communication between agents. The communication is secured using indeed Identity based cryptography, while maintaing the compatibility with standard RSA and eliminating the mediator introduced by mediated RSA. We will show that this approach is convenient in terms of traffic overhead, perfectly applicable to existing trusted platform modules specifications and able to limit damages that both external and internal attackers can produce to the network.
File in questo prodotto:
File Dimensione Formato  
article.pdf

non disponibili

Tipologia: Documento in Pre-print
Licenza: Copyright dell'editore
Dimensione 453.57 kB
Formato Adobe PDF
453.57 kB Adobe PDF   Visualizza/Apri

I documenti in ARCA sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10278/5099989
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact