A Proposal of Replica Management Based on MIC Method Suitable for Mobile Computation Environments

Yasukuni Okataku, Nobukazu Yoshioka, Shinichi Honiden

研究成果: Article

抄録

We propose a fault-tolerant mechanism based on message integrity code (MIC) method for mobile agent authentication under non-secured network environment. We introduce one or more secured nodes (OASIS NODE) and a mobile agent (FT_Agent) having a replica management mechanism. We assume that the candidate agents for authentication are safely stored in an OASIS NODE and a shared secret key is safely distributed to user terminals from the OASIS NODE at the beginning. When the replica agents on user terminals need their authentication, they calculate MIC by using the shared secret key and move themselves having the MIC to the OASIS NODE, which verifies the MIC. The FT_Agents which are also verified by an OASIS NODE are distributed to the each agent and dynamically manage active replicas and passive replicas. By introducing the MIC method and the replica management mechanism, a secured fault-tolerant system suitable for mobile agents under non-secured network environment can be constructed.

元の言語English
ページ(範囲)670-676
ページ数7
ジャーナルIEEJ Transactions on Electronics, Information and Systems
123
発行部数4
DOI
出版物ステータスPublished - 2003 1 1
外部発表Yes

Fingerprint

Mobile agents
Authentication

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

これを引用

@article{c20d16fb008144d3bff0f6be0219f848,
title = "A Proposal of Replica Management Based on MIC Method Suitable for Mobile Computation Environments",
abstract = "We propose a fault-tolerant mechanism based on message integrity code (MIC) method for mobile agent authentication under non-secured network environment. We introduce one or more secured nodes (OASIS NODE) and a mobile agent (FT_Agent) having a replica management mechanism. We assume that the candidate agents for authentication are safely stored in an OASIS NODE and a shared secret key is safely distributed to user terminals from the OASIS NODE at the beginning. When the replica agents on user terminals need their authentication, they calculate MIC by using the shared secret key and move themselves having the MIC to the OASIS NODE, which verifies the MIC. The FT_Agents which are also verified by an OASIS NODE are distributed to the each agent and dynamically manage active replicas and passive replicas. By introducing the MIC method and the replica management mechanism, a secured fault-tolerant system suitable for mobile agents under non-secured network environment can be constructed.",
keywords = "authentication, fault tolerant, mobile agent, reliability",
author = "Yasukuni Okataku and Nobukazu Yoshioka and Shinichi Honiden",
year = "2003",
month = "1",
day = "1",
doi = "10.1541/ieejeiss.123.670",
language = "English",
volume = "123",
pages = "670--676",
journal = "IEEJ Transactions on Electronics, Information and Systems",
issn = "0385-4221",
publisher = "The Institute of Electrical Engineers of Japan",
number = "4",

}

TY - JOUR

T1 - A Proposal of Replica Management Based on MIC Method Suitable for Mobile Computation Environments

AU - Okataku, Yasukuni

AU - Yoshioka, Nobukazu

AU - Honiden, Shinichi

PY - 2003/1/1

Y1 - 2003/1/1

N2 - We propose a fault-tolerant mechanism based on message integrity code (MIC) method for mobile agent authentication under non-secured network environment. We introduce one or more secured nodes (OASIS NODE) and a mobile agent (FT_Agent) having a replica management mechanism. We assume that the candidate agents for authentication are safely stored in an OASIS NODE and a shared secret key is safely distributed to user terminals from the OASIS NODE at the beginning. When the replica agents on user terminals need their authentication, they calculate MIC by using the shared secret key and move themselves having the MIC to the OASIS NODE, which verifies the MIC. The FT_Agents which are also verified by an OASIS NODE are distributed to the each agent and dynamically manage active replicas and passive replicas. By introducing the MIC method and the replica management mechanism, a secured fault-tolerant system suitable for mobile agents under non-secured network environment can be constructed.

AB - We propose a fault-tolerant mechanism based on message integrity code (MIC) method for mobile agent authentication under non-secured network environment. We introduce one or more secured nodes (OASIS NODE) and a mobile agent (FT_Agent) having a replica management mechanism. We assume that the candidate agents for authentication are safely stored in an OASIS NODE and a shared secret key is safely distributed to user terminals from the OASIS NODE at the beginning. When the replica agents on user terminals need their authentication, they calculate MIC by using the shared secret key and move themselves having the MIC to the OASIS NODE, which verifies the MIC. The FT_Agents which are also verified by an OASIS NODE are distributed to the each agent and dynamically manage active replicas and passive replicas. By introducing the MIC method and the replica management mechanism, a secured fault-tolerant system suitable for mobile agents under non-secured network environment can be constructed.

KW - authentication

KW - fault tolerant

KW - mobile agent

KW - reliability

UR - http://www.scopus.com/inward/record.url?scp=85024720193&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85024720193&partnerID=8YFLogxK

U2 - 10.1541/ieejeiss.123.670

DO - 10.1541/ieejeiss.123.670

M3 - Article

AN - SCOPUS:85024720193

VL - 123

SP - 670

EP - 676

JO - IEEJ Transactions on Electronics, Information and Systems

JF - IEEJ Transactions on Electronics, Information and Systems

SN - 0385-4221

IS - 4

ER -