共查询到14条相似文献,搜索用时 171 毫秒
1.
路由安全是移动代理技术面临的主要安全问题之一。基于移动代理的选择式路由是指对于包含在路由信息中的某些支路主机组,用户只要求移动代理经过其中的一条支路主机组即可。基于嵌套加密技术,Mir J首次提出了一个安全的移动代理选择式路由协议。本文利用基本加密签字技术,设计了一个新的基于移动代理的安全选择式路由协议,并且详细分析了协议的安全性和计算复杂度。结果表明,协议不仅满足所有的安全要求,而且与Mir J方案相比,在计算复杂度方面拥有更好的性能。 相似文献
2.
3.
移动代理是一种能在异质网络里各计算机间自主迁移的程序.尽管移动代理技术很适合分布式应用,但是安全问题一直是它得到更广泛应用的主要障碍之一.首先对已有的移动代理路由协议进行分析,然后提出了一个基于基本签字基本加密的移动代理路由协议,并对其安全性和计算复杂度进行了详细分析.结果表明,该协议满足路由协议的所有安全性质,而且相比原有的嵌套签字嵌套加密协议,具有更低的计算复杂度.最后,在此基础上提出了一个基于移动代理的鲁棒路由协议,该协议不需要在主机中配备安全的代理创建环境,对路由主机的配置要求不高,具有更广泛的应用性. 相似文献
4.
移动代理是一种软件程序,它漫游在计算机网络中,经过不同的主机代替用户执行一定的任务。它被认为在未来的电子商务中将起到很重要的作用,但安全问题一直是移动代理得到实际应用的一个很大障碍。本文利用二元Merkle树结合Hash函数给出了一个安全的基于Merkle树的移动代理路由协议。相比原有的嵌套签字加密协议,它显著地降低了移动代理主人的计算复杂度。 相似文献
5.
6.
7.
8.
9.
10.
11.
This article describes a decentralized secure migration process of mobile agents between Mobile‐C agencies. Mobile‐C is an IEEE Foundation for Intelligent Physical Agents (FIPA) standard compliant multi‐agent platform for supporting C/C++ mobile and stationary agents. Mobile‐C is specially designed for mechatronic and factory automation systems where malicious agents may cause physical damage to machinery and personnel. As a mobile agent migrates from one agency to another in an open network, the security concern of mobile agent systems should not be neglected. Security breaches can be minimized considerably if an agency only accepts mobile agents from agencies known and trusted by the system administrator. In Mobile‐C, a strong authentication process is used by sender and receiver agencies to authenticate each other before agent migration. The security framework also aims to guarantee the integrity and confidentiality of the mobile agent while it is in transit. This assures that all agents within an agency framework were introduced to that framework under the supervision and permission of a trusted administrator. The Mobile‐C Security protocol is inspired from the Secure Shell (SSH) protocol, which avoids a single point of failure since it does not rely on a singular remote third party for the security process. In this protocol, both agencies must authenticate each other using public key authentication, before a secure migration process. After successful authentication, an encrypted mobile agent is transferred and its integrity is verified by the receiver agency. This article describes the Mobile‐C secure migration process and presents a comparison study with the SSH protocol. The performance analysis of the secure migration process is performed by comparing the turnaround time of mobile agent with and without security options in a homogeneous environment. Copyright © 2010 John Wiley & Sons, Ltd. 相似文献
12.
基于IPSec的无线局域网安全解决方案的研究 总被引:6,自引:0,他引:6
论文对无线局域网WEP协议的算法及安全性进行了深入的研究和分析,在对移动IP计算原理深入讨论的基础上提出了基于IPSec的无线局域网安全问题的解决方案,并应用IPSec嵌套通道建立了VPN安全隧道构造机制。这种机制从很大程度上解决了无线局域网的安全隐患问题。 相似文献
13.
Mobile agents are a distributed computing paradigm based on mobile autonomous programs. Mobile applications must balance security requirements with available security mechanisms in order to meet application level security goals. We introduce a trust framework to reason about application security requirements, trust expression, and agent protection mechanisms. We develop application security models that capture initial trust relationships and consider their use for mobile agent security. 相似文献
14.
移动代理(MA)是能够在异构网络中自主迁移的软件实体,它的迁移性和自治性很好地弥补了分布式技术的不足,具有广阔的应用前景;但移动代理安全性问题的存在,严重阻碍了它在实际中的应用.保护代理免受恶意主机的攻击是移动代理系统独有的安全问题.由于代理必须在主机环境中运行,有效解决该问题比较困难.提出一种基于迷乱代理数据变量和时间核查技术的移动代理保护方案,同时给出获得时间核查技术中主要数据的方法.该方案在实际网络管理环境中进行了验证,能够有效地识别恶意主机,移动代理的保护率达95%以上. 相似文献