Skip to main content
Erschienen in: Wireless Personal Communications 2/2019

04.04.2019

Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol

verfasst von: Prabhjot Kaur Jolly, Shalini Batra

Erschienen in: Wireless Personal Communications | Ausgabe 2/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Securing the mobile agents from malicious code execution is the next phase of mobile network computing. Malicious code execution is one of the serious attacks in mobile agent network. To restrict the attack to an extent, a strong authentication protocol should be developed to secure from agent attacks. In this paper, an efficient encryption protocol is developed to restrict the execution of malicious code in mobile agents. The integrated bloom filter (IBF) is proposed in this work to filter the agent code and break the code into byte array blocks and generates the initial keys. For an efficient encryption and decryption, a robust and flexible key is needed, the elliptic curve is defined in this paper to generate the private and public key for the encryption process. The Ciphertext Policy Attribute-Based Encryption (CPABE) is a public key encryption method deduced to encrypt the information in the form of ciphertext associated with attributes. The implementation of proposed work is executed in the JADE platform and results are evaluated and compared with existing protocols such as Fragmentation and AES. Thus the proposed IBF-CPABE protocol is an efficient method for offering optimal security in mobile agents from various attacks and malicious code execution.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Heydari, M., Sadough, S. M. S., Farash, M. S., Chaudhry, S. A., & Mahmood, K. (2016). An efficient password-based authenticated key exchange protocol with provable security for mobile client–client networks. Wireless Personal Communications, 88(2), 337–356.CrossRef Heydari, M., Sadough, S. M. S., Farash, M. S., Chaudhry, S. A., & Mahmood, K. (2016). An efficient password-based authenticated key exchange protocol with provable security for mobile client–client networks. Wireless Personal Communications, 88(2), 337–356.CrossRef
2.
Zurück zum Zitat Roman, R., Lopez, J., & Mambo, M. (2016). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698.CrossRef Roman, R., Lopez, J., & Mambo, M. (2016). Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, 680–698.CrossRef
3.
Zurück zum Zitat Patel, A., Alhussian, H., Pedersen, J. M., Bounabat, B., Júnior, J. C., & Katsikas, S. (2017). A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems. Computers and Security, 64, 92–109.CrossRef Patel, A., Alhussian, H., Pedersen, J. M., Bounabat, B., Júnior, J. C., & Katsikas, S. (2017). A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems. Computers and Security, 64, 92–109.CrossRef
4.
Zurück zum Zitat Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., et al. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98–120.CrossRef Iqbal, S., Kiah, M. L. M., Dhaghighi, B., Hussain, M., Khan, S., Khan, M. K., et al. (2016). On cloud security attacks: A taxonomy and intrusion detection and prevention as a service. Journal of Network and Computer Applications, 74, 98–120.CrossRef
5.
Zurück zum Zitat Kwon, H., Kim, D., Hahn, C., & Hur, J. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools and Applications, 76(19), 1–15. Kwon, H., Kim, D., Hahn, C., & Hur, J. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools and Applications, 76(19), 1–15.
6.
Zurück zum Zitat Kollati, V. K. (2017). IBFWA: Integrated bloom filter in watchdog algorithm for hybrid black hole attack detection in MANET. Information Security Journal: A Global Perspective, 26(1), 49–60. Kollati, V. K. (2017). IBFWA: Integrated bloom filter in watchdog algorithm for hybrid black hole attack detection in MANET. Information Security Journal: A Global Perspective, 26(1), 49–60.
7.
Zurück zum Zitat Phuong, T. V. X., Yang, G., & Susilo, W. (2016). Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Transactions on Information Forensics and Security, 11(1), 35–45.CrossRef Phuong, T. V. X., Yang, G., & Susilo, W. (2016). Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Transactions on Information Forensics and Security, 11(1), 35–45.CrossRef
8.
Zurück zum Zitat Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265–1277.CrossRef Wang, S., Zhou, J., Liu, J. K., Yu, J., Chen, J., & Xie, W. (2016). An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(6), 1265–1277.CrossRef
9.
Zurück zum Zitat Choo, K. K. R., Domingo-Ferrer, J., & Zhang, L. (2016). Cloud cryptography: Theory, practice and future research directions. Future Generation Computing Systems, 62, 51–53.CrossRef Choo, K. K. R., Domingo-Ferrer, J., & Zhang, L. (2016). Cloud cryptography: Theory, practice and future research directions. Future Generation Computing Systems, 62, 51–53.CrossRef
10.
Zurück zum Zitat Jiang, R., Lu, R., & Choo, K. K. R. (2016). Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Generation Computer Systems, 78, 392–401.CrossRef Jiang, R., Lu, R., & Choo, K. K. R. (2016). Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Generation Computer Systems, 78, 392–401.CrossRef
11.
Zurück zum Zitat Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115.CrossRef Li, Y., Gai, K., Qiu, L., Qiu, M., & Zhao, H. (2017). Intelligent cryptography approach for secure distributed big data storage in cloud computing. Information Sciences, 387, 103–115.CrossRef
12.
Zurück zum Zitat Zhang, Y., Kumar, N., Chen, J., & Rodrigues, J. J. (2016). A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Security and Communication Networks, 9(17), 3944–3951.CrossRef Zhang, Y., Kumar, N., Chen, J., & Rodrigues, J. J. (2016). A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography. Security and Communication Networks, 9(17), 3944–3951.CrossRef
13.
Zurück zum Zitat Xu, X., Zhou, J., Wang, X., & Zhang, Y. (2016). Multi-authority proxy re-encryption based on CPABE for cloud storage systems. Journal of Systems Engineering and Electronics, 27(1), 211–223. Xu, X., Zhou, J., Wang, X., & Zhang, Y. (2016). Multi-authority proxy re-encryption based on CPABE for cloud storage systems. Journal of Systems Engineering and Electronics, 27(1), 211–223.
14.
Zurück zum Zitat Shehada, D., Yeun, C.Y., Zemerly, M.J., Al Qutayri, M., Al Hammadi, Y., Damiani, E. & Hu, J. (2017). BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications. Security and Communication Networks. Shehada, D., Yeun, C.Y., Zemerly, M.J., Al Qutayri, M., Al Hammadi, Y., Damiani, E. & Hu, J. (2017). BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications. Security and Communication Networks.
16.
Zurück zum Zitat Audithan, S., Murunya, T. S., & Vijayakumar, P. (2016). Anonymous authentication for secure mobile agent based internet business. Circuits and Systems, 7(08), 1421.CrossRef Audithan, S., Murunya, T. S., & Vijayakumar, P. (2016). Anonymous authentication for secure mobile agent based internet business. Circuits and Systems, 7(08), 1421.CrossRef
17.
Zurück zum Zitat Kim, D., Jung, S., Hwang, D. J., & Kim, S. (2016). Mobile-based dos attack security agent in sensor networking. Wireless Personal Communications, 86(1), 91–107.CrossRef Kim, D., Jung, S., Hwang, D. J., & Kim, S. (2016). Mobile-based dos attack security agent in sensor networking. Wireless Personal Communications, 86(1), 91–107.CrossRef
18.
Zurück zum Zitat Gavalas, D., Venetis, I. E., Konstantopoulos, C., & Pantziou, G. (2017). Mobile agent itinerary planning for WSN data fusion: considering multiple sinks and heterogeneous networks. International Journal of Communication Systems, 30(8), e3184.CrossRef Gavalas, D., Venetis, I. E., Konstantopoulos, C., & Pantziou, G. (2017). Mobile agent itinerary planning for WSN data fusion: considering multiple sinks and heterogeneous networks. International Journal of Communication Systems, 30(8), e3184.CrossRef
19.
Zurück zum Zitat Vijayalakshmi, A., & Palanivelu, T. G. (2016). Enhanced security for wireless sensor networks using smart mobile agents. Indian Journal of Science and Technology, 9(35), 1–5.CrossRef Vijayalakshmi, A., & Palanivelu, T. G. (2016). Enhanced security for wireless sensor networks using smart mobile agents. Indian Journal of Science and Technology, 9(35), 1–5.CrossRef
20.
Zurück zum Zitat Oyediran, M.O., Fagbola, T.M., Olabiyisi, S.O., Omidiora, E.O. & OMember, F.A. (2016). A survey on migration process of mobile agent. In Proceedings of the world congress on engineering and computer science (Vol. 1). Oyediran, M.O., Fagbola, T.M., Olabiyisi, S.O., Omidiora, E.O. & OMember, F.A. (2016). A survey on migration process of mobile agent. In Proceedings of the world congress on engineering and computer science (Vol. 1).
21.
Zurück zum Zitat Ying, Z., Li, H., Ma, J., Zhang, J., & Cui, J. (2016). Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Science China Information Sciences, 59(4), 042701.CrossRef Ying, Z., Li, H., Ma, J., Zhang, J., & Cui, J. (2016). Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Science China Information Sciences, 59(4), 042701.CrossRef
22.
Zurück zum Zitat Liu, L., Lai, J., Deng, R. H., & Li, Y. (2016). Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Security and Communication Networks, 9(18), 4897–4913.CrossRef Liu, L., Lai, J., Deng, R. H., & Li, Y. (2016). Ciphertext-policy attribute-based encryption with partially hidden access structure and its application to privacy-preserving electronic medical record system in cloud environment. Security and Communication Networks, 9(18), 4897–4913.CrossRef
23.
Zurück zum Zitat Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2016). A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research, 16(1), 113–139.CrossRef Chaudhry, S. A., Farash, M. S., Naqvi, H., & Sher, M. (2016). A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography. Electronic Commerce Research, 16(1), 113–139.CrossRef
Metadaten
Titel
Security against Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol
verfasst von
Prabhjot Kaur Jolly
Shalini Batra
Publikationsdatum
04.04.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06329-7

Weitere Artikel der Ausgabe 2/2019

Wireless Personal Communications 2/2019 Zur Ausgabe

Neuer Inhalt