From the perspective of overall system security, a mobile agent system security mechanism scheme for large-scale network applications is proposed. This scheme adopts a two-way authentication technology based on hybrid encryption to solve the local security problem of the mobile agent system. The key distribution and management are completed through the mobile agent security management platform at all levels. The migration of mobile agents is reasonably assigned and scheduled. The cross-segment security migration of mobile agents is solved through the task transfer mode. These measures have comprehensively solved the overall security problem of the current mobile agent system. Moreover, due to the hierarchical system structure and management mode, this scheme is very suitable for the current application development for large-scale networks. Keywords Identity authentication; mobile agent; network application; security mechanism The good characteristics of mobile agent (MA) technology [1] provide many new technical solutions for network-based applications. However, the promotion of mobile agent technology is largely restricted by the security problem of mobile agents [2]. Mobile agents need to move to the host and execute the corresponding code, but neither mobile agents nor service facilities can fully and accurately predict each other\'s behavior and consequences. Therefore, the security mechanism of the mobile agent system must be two-way, that is, service facilities and mobile agents are both implementers and objects of security policies. From the existing solutions to the security problems of mobile subjects [2-9], it can be seen that they are effective in ensuring the security of both parties when MA accesses a certain MA platform, that is, solving local security problems. However, there are still some urgent problems to be solved in solving the security problems of application systems with hierarchical network structures, containing a large number of nodes, and built on mobile subject technology, that is, solving overall security problems. For example, how to reduce the difficulty of system operation and maintenance, improve the flexibility of system applications, and meet the requirements of hierarchical system structure and management mode of large-scale network applications while ensuring the overall and local security of the system. In view of the current security problems of mobile subject technology in large-scale network applications, this paper proposes a security mechanism based on hierarchical system structure and management mode, combined with solutions to local security problems, and attempts to solve the security problems of mobile subject systems from the perspective of overall security. 1 Solution to local security problems The local security problem of mobile subject systems mainly involves how to ensure the security of both parties when mobile subjects interact with service facilities. What needs to be solved is the problem of two-way permissions and trust. For the mobile subject permission problem, this paper uses Java\'s own security mechanism [10] to solve it. For the mobile subject trust problem, this paper adopts a solution based on hybrid encryption [9]. In this encrypted communication mode, the two communicating parties each have the other party\'s public key information. The initiator of the communication randomly generates a symmetric session key Key (such as a DES key) during each communication, and uses the Key to encrypt the communication content and the information summary of the communication content to form a ciphertext C1. At the same time, the key Key is encrypted with the sender\'s private key and the receiver\'s public key to obtain the ciphertext C2, and then C1 and C2 are sent. After receiving the ciphertext, the receiver first decrypts C2 with its own private key and the other party\'s public key to obtain the Key, and then uses the Key to decrypt C1 to obtain the communication content and the corresponding information summary. Finally, the information summary of the communication content is recalculated and the result is compared with the received information summary to ensure the authenticity of the communication content. If the identity of the mobile subject is confirmed, the subject can work according to the set task, otherwise the subject will be abandoned. This hybrid encryption technology generally does not require additional communication to achieve double identity confirmation. (1) For the sender, there is no need to worry that the disguised receiver will steal the useful information in the ciphertext, because it does not have the private key of the real receiver, so it cannot perform the first decryption. (2) For the receiver, as long as it can complete the second decryption and confirm that the obtained plaintext is valid, the identity of the sender can be confirmed, because the disguised sender does not have the private key of the real sender. The local security solution of the mobile subject must be based on the absolute security of the private keys held by each MA platform. After the mobile subject completes the two-way authentication on the receiving platform according to the above local security solution, it can perform tasks through the platform and interface provided by the mobile subject service facility. Since the session key Key carried by the mobile subject is one-time and unknown to third parties, the mobile subject can use the key for subsequent communication with the sending platform, thereby reducing computing overhead.
You Might Like
Recommended ContentMore
Open source project More
Popular Components
Searched by Users
Just Take a LookMore
Trending Downloads
Trending ArticlesMore