期刊文献+

一种基于混合加密的移动代理安全传输模型 被引量:2

A Secure Transport Model of Mobile Agent Based on Hybrid Encryption
下载PDF
导出
摘要 该文分析了目前移动代理系统存在的主要安全问题及现有的解决方案,随后提出了一种基于混合加密的移动代理安全传输模型(HESTM).该模型主要分成两部分: (1)利用混合加密算法加密移动代理;(2)利用TLS加密通信信道.仿真与性能分析表明,HESTM模型的确能有效地保护移动代理的传输安全,从而有效地提高了整个系统的安全性和稳健性.该箅法已成功地应用在作者开发的原型系统-基于移动代理的入侵检测系统中. This article analyzes the main security problems that current mobile agent systems face with and existing solving methods, then a secure transport model of mobile agent based on hybrid encryption HESTM is brought forward. The model comprises two parts: (1) Using hybrid encryption encrypt mobile agent; (2) Using TLS encrypts communication channel. The simulation and performance analysis show that HESTM can efficiently protect the transport security of mobile agent indeed, thus enhance the security and robustness of the whole system. This algorithm has been successfully applied in authors developed prototype-mobile agent based intrusion detection system.
出处 《电子与信息学报》 EI CSCD 北大核心 2004年第9期1407-1412,共6页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60173037和70271050) 江苏省自然科学基金(BK2003105) 国家高科技项目863(2002AA776032) 江苏省计算机信息处理技术重点实验室基金(kjs03061和kjs04)资助课题
关键词 移动代理系统 混合加密 安全传输 入侵检测系统 原型系统 传输安全 算法 信道 加密通信 稳健性 Mobile agent, Transport Layer Security(TLS), Hybrid encryption
  • 相关文献

参考文献8

  • 1Fritz Hohl. A protocol to detect malicious hosts attacks by using reference states. Technical Report Nr.09/99, Faculty of Informatics, University of Stuttgart, Germany, 1999.
  • 2Giovanni Vigna. Cryptographic Traces for Mobile Agents, Mobile Agents and Security, Berlin:Springer-Verlag, 1998, LNCS 1419: 137-153.
  • 3Fritz Hohl. Time Limited Blackbox Security: Protecting mobile agents from malicious hosts,Mobile Agents and Security, Berlin: Springer-Verlag, 1998, LNCS 1419: 92-113.
  • 4UWE G. Wilhelm, Sebastian M. Staamann, Levente Buttyan. A pessimistic approach to trust in mobile agent platforms. IEEE Internet Computing, 2000, 4(5): 40-48.
  • 5Dierks T, Allen C. The TLS Protocol. IETF, January 1999.
  • 6Sander T, Tschudin C F. Towards mobile cryptography. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1998: 215-224.
  • 7王汝传,郑晓燕.移动代理技术及其在电子商务中的应用研究[J].南京邮电学院学报,2001,21(2):80-82. 被引量:2
  • 8GarmsJ SomerfieldD.Java安全性编程指南[M].北京:电子工业出版社,2002.136-169.

二级参考文献2

  • 1IBM Tokyo Research Laboratory. Java Aglet Application Programming Interface: White Paper-Draft2 [DB/OL]. http://www. trl. ibm. co. jp/aglets/JAAPI - whitepaper. html, 1997-02-19.
  • 2刘大有,杨鲲,陈建中.Agent研究现状与发展趋势[J].软件学报,2000,11(3):315-321. 被引量:313

共引文献2

同被引文献17

  • 1陈良,高成敏.移动代理系统安全体系结构研究[J].计算机系统应用,2006,15(6):34-36. 被引量:1
  • 2GUAN Huanmei,MENG Xuejun,ZHANG Huanguo.A Forward Integrity and Itinerary Secrecy Protocol for Mobile Agents[J].Wuhan University Journal of Natural Sciences,2006,11(6):1727-1730. 被引量:1
  • 3张云勇 刘锦德.移动agent技术[M].北京:清华大学出版社,2003..
  • 4Gupta R, Kansal G. Survey on comparative study of mobile a- gent platforms [ J ]. International Journal of Engineering Sci- ence and Technology ,2011,3 ( 3 ) : 1943-1948.
  • 5Greenberg M 3, Jenniler ~. Mobde agent and security [ J ]. IEEE Communication Magazine, 1998,36 ( 7 ) :76- 85.
  • 6Borselius N. Mobile agent security[ J]. Electronics & Commu- nication Engineering Journal,2002,14 (5) : 21 1-218.
  • 7Corradi A, Cremonini M. Agents integrity for electronic com- merce application [ J ]. Information System, 1999,24 (6) :519- 533.
  • 8Min Yao, Kun Peng, Ed Dawson. Using "Fair Forfeit" to pre- vent truncation attack on mobile agents [ C]//Proc of 10th Australasian Conference. [ s. I. ] : [ s. n. ] ,2005:158-169.
  • 9Ouardani A, Pierre S, Boucheneb H. A security protocol for mobile Agent based upon the cooperation of sedentary Agents [ J ]. Journal of Network and Computer Applications, 2007,30 (3) :1228-1243.
  • 10王春风,钱军.网络安全中基于DES和RSA混合加密技术的研究[J].淮南师范学院学报,2007,9(5):26-28. 被引量:4

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部