Deakin University
Browse

File(s) under permanent embargo

Agents based e-commerce and securing exchanged information

chapter
posted on 2009-01-01, 00:00 authored by Raja Al-Jaljouli, Jemal AbawajyJemal Abawajy
Mobile agents have been implemented in e-commerce to search and filter information of interest from electronic markets. When the in format ion is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent's itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described , which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol using Symbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data authenticity, origin confidentiality and data non-repudiability.

History

Title of book

Pervasive computing : innovations in intelligent multimedia and applications

Chapter number

17

Pagination

383 - 404

Publisher

Springer

Place of publication

Dordrecht, Germany

ISSN

1617-7975

ISBN-13

9781848825987

ISBN-10

1848825986

Language

eng

Publication classification

B1 Book chapter

Copyright notice

2009, Springer

Extent

19

Editor/Contributor(s)

A Hassanien, J Abawajy, A Abraham, H Hagras