Security of Mobile Agent in Ad hoc Network using Threshold Cryptography

In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security. Security services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network.





References:
[1] Wikipedia the free encyclopedia. Ad hoc. (Online) (Updated 1 March
2010) Available at: http://en.wikipedia.org/wiki/Ad_hoc (Accessed 3
March 2010).
[2] SearchMobileComputing.com Definitions. ad-hoc network. (Online)
(Updated 5 Dec 2000) Available at: http://searchmobile computing
.techtarget.com/definition/ad-hoc-network [Accessed 3 March 2010].
[3] Wikipedia the free encyclopedia. Mobile agent. (Online) (Updated 1
March 2010) Available at: http://en.wikipedia.org/wiki/Mobile _agent
(Accessed 3 March 2010).
[4] Lidong Zhou, Zygmunt Haas, 1999. Securing Ad Hoc Networks.
[Online] Cornell University Ithaca, NY, USA. Available at:
http://www.cs.cornell.edu/home/ldzhou/adhoc.pdf (Accessed 2 March
2010).
[5] Tarig Mohammad Ahmed, 2009. Using Secure-Image Mechanism to
Protect Mobile Agent against malicious Hosts. (Online) World
Academy of Science, Engineering and Technology. Available at:
http://www.waset.org/journals/waset/v59/v59-82.pdf (Accessed 2
March 2010).
[6] Niklas Borselius, Mobile agent security. (Online) Information Security
Group, Royal Holloway, University of London. Available at:
http://www.agent.ai/doc/upload/200402/bors02_1.pdf (Accessed 1
March 2, 2010).
[7] Mieso K. Denko and Qusay H. Mahmoud, Mobile Agents for Clustering
and Routing in Mobile Ad Hoc Networks, In : S. Pieere, M. Barbeau, E.
Kranakis, Eds. 2nd International Conference on Ad Hoc Networks and
Wireless (ADHOC-NOW-03), 8-10 oct. 2003, Montreal, Canada,
Springer, 2003, pp. 271-276.
[8] ZHANG Yi, ZHU Lina and FENG Li, 2009. Key Management and
Authentication in Ad Hoc Network based on Mobile Agent (Online)
JOURNAL OF NETWORKS, VOL. 4, NO. 6, AUGUST 2009
Available at: http://www.academypublisher com/ ojs/index.
php/jnw/article/viewFile/0406487494/817 (Accessed 2 March 2010).
[9] Dale, J. and DeRoure, D. C. (1997) A Mobile Agent Architecture for
Distributed Information Management. In: Proceedings of the
International Workshop on the Virtual Multicomputer. 1997.
[10] David Kotz and Robert S. Gray, 1999. Mobile Agents and the Future of
the Internet. (Online) Available at: http://www.cs
.dartmouth.edu/~dfk/papers/kotz:future2/ (Accessed 2 March 2010).
[11] Wayne Jansen, Tom Karygiannis, NIST Special Publication 800-19 -
Mobile Agent Security. (Online) National Institute of Standards and
Technology. Available at: http://csrc.nist.gov/
publications/nistpubs/800-19/sp800-19.pdf (Accessed 1 March 2010).
[12] The University of Birmingham, 2004. Symmetric-key cryptography.
[Online] Available at: http://www.cs.bham.ac. uk/~mdr/
teaching/modules04/security /lectures/symmetric-key.html (Accessed 2
March 2010).
[13] Sun Microsystems Documentation. Introduction to Public-Key
Cryptography. (Online) (Updated 10 September 1998) Available at:
http://docs.sun.com/source/816-6154-10/contents.htm (Accessed 1
March 2010).
[14] Giovanni Vigna, 1997. Protecting Mobile Agents through Tracing
[Online] Research Publication Repository of KFUPM (King Fahd
University of Petroleum & Minerals) Available at:
https://eprints.kfupm.edu.sa/59734/1/59734.pdf (Accessed 2 March
2010).
[15] B. S. Yee, A Sanctuary for Mobile Agents, In: Secure Internet
Programming, pp 261-273, 1999.
[16] YANG Ya-tao, ZENG Ping, FANG Yong, CHI Ya-Ping, 2007. A
Feasible Key Management Scheme in Ad hoc Network. (Online) IEEE.
Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp
?arnumber=04287521 (Accessed 6 March 2010).