This paper proposes a new method of data authentication and encryption for distributed networks supporting mobile software agents. Software agents are a valuable instrument in wireless distributed monitoring networks, since they can be used to concentrate the monitoring effort in certain areas where an event is taking place. This way events can be tracked in a dynamic and efficient way. Mobile agents have to send messages to each other in order to coordinate their action, and those messages need to be secured by crypto credentials. But when the agents are moved over a wireless networks, how can the credentials be protected from sniffing by an attacker, besides layer II encryption? And if a rogue agent is injected in the network is it possible to limit the damages it can produce? The proposed approach bridges mediated RSA with the trusted platform modules (TPM) in order to provide an efficient and secure communication between agents. The communication is secured using ID-based cryptography while maintaing the compatibility with standard RSA and eliminating the mediator introduced by mRSA. We will show that this approach is convenient in terms of traffic overhead, perfectly applicable to existing TPM specifications and able to limit the damage that both an external and an internal attacker can produce to the network

Protecting mobile agents communications in pervasive networks with a trusted distributed mediator for ID-based RSA / Leonardo Maccari; Romano Fantacci; Tommaso Pecorella; Francesco Chiti; G. Ghettini. - In: SECURITY AND COMMUNICATION NETWORKS. - ISSN 1939-0122. - STAMPA. - 7:(2014), pp. 1887-1899. [10.1002/sec.903]

Protecting mobile agents communications in pervasive networks with a trusted distributed mediator for ID-based RSA

MACCARI, LEONARDO;FANTACCI, ROMANO;PECORELLA, TOMMASO;CHITI, FRANCESCO;
2014

Abstract

This paper proposes a new method of data authentication and encryption for distributed networks supporting mobile software agents. Software agents are a valuable instrument in wireless distributed monitoring networks, since they can be used to concentrate the monitoring effort in certain areas where an event is taking place. This way events can be tracked in a dynamic and efficient way. Mobile agents have to send messages to each other in order to coordinate their action, and those messages need to be secured by crypto credentials. But when the agents are moved over a wireless networks, how can the credentials be protected from sniffing by an attacker, besides layer II encryption? And if a rogue agent is injected in the network is it possible to limit the damages it can produce? The proposed approach bridges mediated RSA with the trusted platform modules (TPM) in order to provide an efficient and secure communication between agents. The communication is secured using ID-based cryptography while maintaing the compatibility with standard RSA and eliminating the mediator introduced by mRSA. We will show that this approach is convenient in terms of traffic overhead, perfectly applicable to existing TPM specifications and able to limit the damage that both an external and an internal attacker can produce to the network
2014
7
1887
1899
Leonardo Maccari; Romano Fantacci; Tommaso Pecorella; Francesco Chiti; G. Ghettini
File in questo prodotto:
File Dimensione Formato  
article.pdf

Accesso chiuso

Tipologia: Altro
Licenza: Tutti i diritti riservati
Dimensione 453.57 kB
Formato Adobe PDF
453.57 kB Adobe PDF   Richiedi una copia

I documenti in FLORE sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificatore per citare o creare un link a questa risorsa: https://hdl.handle.net/2158/816104
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact