期刊文献+

可证明安全的移动代理路由协议

Provable Security Mobile Agent Routing Protocol
下载PDF
导出
摘要 针对移动代理路由安全问题,利用Hash函数单向性和迭代方法提出一种移动代理路由协议。用户主机通过Hash函数的单向性保证路由信息安全到达路由主机,路由主机之间根据Hash函数值的迭代进行交互认证。该协议的计算复杂度显著降低,特别是在大数据传输的情况下。采用常规方法和串空间模型方法分析并证明了该协议的安全性。 A new mobile routing protocol using Hash function and iterative method is proposed in this paper for solving mobile agent routing security problems. User hosts are able to ensure routing information transporting to the others securely by the unidirectional feature of Hash function, and verify each other by the iteration of Hash function. The analysis shows that the computational complexity of the routing protocol is drastically reduced, especially in the condition of transporting large number of data. The normal and the strand space models are adopted to prove the security of the protocol.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第7期154-156,共3页 Computer Engineering
基金 安徽省教育厅自然科学基金资助项目(2006KJ046B)
关键词 移动代理 迭代 单向散列 串空间 计算复杂度 mobile agent iterative Hash function strand space computational complexity
  • 相关文献

参考文献5

  • 1Domingo J. Mobile Agent Route Protection Through Hash-based Mechanisms[C].Proc. of INDO-CRYPT'01 Berlin: Springer-Verlag, 2001.
  • 2Sander T, Tsehudin C F. Protecting Mobile Agents Against Malicious Hosts[C].Proc. of Conference on Mobile Agents and Security. Berlin, Gerrnanyt Springer-Verlag, 1998.
  • 3Mir J, Borrell J. Protecting General Flexible Itineraries of Mobile Agents[C].Proc. of ICICS'01. Berlin, Germany: Springer-Verlag, 2002.
  • 4柳毅,伍前红,王育民.基于移动代理的可变路由安全协议[J].计算机学报,2005,28(7):1118-1122. 被引量:5
  • 5Guttman J D, Fabrega F J T. Authentication Tests and the Structure of Bundles[J]. Theoretical Computer Science, 2002, 283(2): 333-380.

二级参考文献6

  • 1Belmon S.G., Yee B.S.. Mobile agent and intellectual property protection. In: Rothermel K., Hohl F. eds. Mobile Agents, LNCS 1477. Berlin: Springer-Verlag, 1998, 172~183
  • 2Vigna G.. Cryptographic traces for mobile agents. In: Vigna G. ed. Mobile Agents and Security, LNCS 1419. Berlin: Springer-Verlag, 1998, 137~153
  • 3Westhoff D., Schneider M., Unger C., Kaderali F.. Methods for protecting a mobile agent's route. In: Mambo M., Zheng Y. eds. Proceedings of the 2nd International Information Security Workshop, ISW'99, LNCS 1729. Berlin: Springer-Verlag, 1999, 57~71
  • 4Domingo J.. Mobile agent route protection through hash-based mechanisms. In: Pandu Rangan C., Ding C. eds. INDOCRYPT 2001, LNCS 2247. Berlin: Springer-Verlag, 2001, 17~29
  • 5Sander T., Tschudin C.F.. Protecting mobile agents against malicious hosts. In: Heys H., Adams C. eds. Mobile Agents and Security, LNCS 1419. Berlin: Springer-Verlag 1998, 44~60
  • 6Mir J., Borrell J.. Protecting general flexible itineraries of mobile agents. In: Kim K. ed. ICICS 2001, LNCS 2288. Berlin: Springer-Verlag, 2002, 382~396

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部