File(s) under permanent embargo
Agents based e-commerce and securing exchanged information
Mobile agents have been implemented in e-commerce to search and filter information of interest from electronic markets. When the in format ion is very sensitive and critical, it is important to develop a novel security protocol that can efficiently protect the information from malicious tampering as well as unauthorized disclosure or at least detect any malicious act of intruders. In this chapter, we describe robust security techniques that ensure a sound security of information gathered throughout agent's itinerary against various security attacks, as well as truncation attacks. A sound security protocol is described , which implements the various security techniques that would jointly prevent or at least detect any malicious act of intruders. We reason about the soundness of the protocol using Symbolic Trace Analyzer (STA), a formal verification tool that is based on symbolic techniques. We analyze the protocol in key configurations and show that it is free of flaws. We also show that the protocol fulfils the various security requirements of exchanged information in MAS, including data-integrity, data-confidentiality, data authenticity, origin confidentiality and data non-repudiability.
History
Title of book
Pervasive computing : innovations in intelligent multimedia and applicationsChapter number
17Pagination
383 - 404Publisher
SpringerPlace of publication
Dordrecht, GermanyISSN
1617-7975ISBN-13
9781848825987ISBN-10
1848825986Language
engPublication classification
B1 Book chapterCopyright notice
2009, SpringerExtent
19Editor/Contributor(s)
A Hassanien, J Abawajy, A Abraham, H HagrasUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC