ABSTRACT
A data integrity solution for mobile agents is presented. The proposed scheme combines digital watermarking and digital signature to achieve the desired security requirements of strong forward integrity, truncation resilience and non-repudiation. The results computed at each hop are first watermarked and then digitally signed. When the agent returns to the home platform we verify the signature first and then extract watermark. Any tampering with the results can be determined in the verification process. We have implemented the proposed scheme with various hashing algorithms like SHA-1, SHA-256 and SHA-512 for a price comparison scenario. For digital signature we have used RSA based signature. We have applied t-test to check the significance of present results. Present experimental results suggest that it can be used in an e-commerce application.
PDF Abstract XML References Citation
How to cite this article
DOI: 10.3923/itj.2008.24.31
URL: https://scialert.net/abstract/?doi=itj.2008.24.31
INTRODUCTION
Mobile agents are software entities consisting of code, data and state that can move from one host to another in a network performing task on behalf of a user or an application. Mobile Agents have been employed in a variety of applications such as information retrieval, workflow management, network management etc. Mobile agents offer many advantages over traditional client server paradigm such as saving network bandwidth, introducing concurrency, adding client specific functionality to servers etc. Despite all these advantages the use of mobile agents is limited mainly because of the security issues associated with them. The security in mobile agents can be divided into two categories: first is the security of the host executing the agent and second is the security of the mobile agent from malicious host. The second type of security can further be divided into two subtypes (1) Security of static code (2) Security of dynamic data state. The security of the dynamic data state is the focus of this study. This paper proposes a method for protecting the computation results of mobile agents. The proposed idea is to initially use reversible watermarking to watermark the results collected by a mobile agent at a remote host. Then compute a cryptographic hash over the watermark results to protect against attacks such as non-repudiation. Any tampering with results can be detected. Digital signature uses a one way function like SHA-1 or SHA-256 or SHA-512. After watermarking the results, these watermarked results are used as input to the hash function. The produced hash is then signed by the private key of the host thus forming a digital signature. The watermarked results, signature and public key of the signer are the proof of the agent execution at a host. This information (watermarked results, signature and public key) is produced per hop on which a mobile agent is executed. This information travels with the agent from server to server until the agent returns to the home platform. When the mobile agent returns to the home platform first of all the hash of the watermarked results is recomputed and then it is verified with the public key of each host. If the stored and produced hash match we say that the results are untampered and can be considered as trusted. In case if there is no match we say that the host has tampered with the results and the host is considered as malicious host.
RELATED WORK
Mobile agent`s execution platform is responsible for providing necessary environment and resources in order to successfully execute an agent. Methods that have been devised to protect the computation results of a mobile agent includes Partial Results Authentication Code (PRAC) (Yee, 1999), Chain Hash Chaining (Karjoth et al., 1998), Set Authentication code (Loureiro, 2001) and Ring Signature (Lin et al., 2004). Yee proposed the idea of PRAC in which the results of an agent`s computation at each host is encapsulated using MAC (Message Authentication Code). The result of an agent`s execution combined with MAC of the results is called PRAC. This method requires the agent to produce a secret key for each host, using one way function, from the initial secret key given by the originator. This method makes sure to provide forward integrity which means, “Anone of the results calculated prior to a malicious host can be tampered”. In Hash Chaining method the partial results are chained to the identity of the next host in itinerary. This method allows the originator to determine where exactly the chaining is broken if a host behaves maliciously by tampering with the partial results. Although this method provides stronger security it is not flexible enough.
Vigna (1998) gave the idea of cryptographic traces based on the execution tracing and cryptography. It allows the detection of attacks against the code, state and execution flow for mobile agents. These facts can be used to punish the attackers. However this method has some limitation e.g. mobile agent code is executed again only in case of suspicion although there is suspicion detection protocol but its cost is too high.
Roth (1999) proposed the idea of transferring commitments to other cooperating agents. This agent can do tasks like storing, gathering and verifying the information. The underlying principle is the generalization of the trusted third party. These cooperating agents share secrets and decisions and have a disjoint itinerary. Each cooperating agent record the itinerary of other cooperating agent. This makes collusion attacks difficult but not impossible. However this technique is only effective if this requirement can be realistically met.
Hohl (2000) proposed the idea of reference state. A reference state is a state that is produced by a non-attacking host or reference host. In this model the execution on one host is checked unconditionally and immediately on the next host, regardless of whether this host is trusted or untrusted.
Villate et al. (2000) proposed the notion of data lockers. It is a service provided for mobile users to keep their data in secure and safe locations.
Rivest et al. (2001) gave the idea of Ring Signature, in which no prior setup process and no group manager are necessary. It is a special form of generalized group signature.
Loureiro (2001) proposed an original cryptographic technique called Set Authentication Code. In this technique each host exchanges a secret key with the agent owner. This key is used to calculate MAC on its results. When the mobile agent returns to the home platform this integrity proof can be verified.
Roth (2001) pointed out some flaws in some of the proposed protocols of Karnik and Tripathi (1999), Corradi et al. (1999) and Karjoth et al. (1998). According to Roth these protocols failed because they were unable to bind the collected data by agent with its static code. He proposed fixing these protocols by binding confidential data and acquired data via constructing an agent kernel and ciphertexts. This allows authorized hosts to detect whether a ciphertext brought by an agent actually belongs to the agent.
McDonald et al. (2004) gave the idea of using multi-agent architecture. They used different classes of agents like task agent, data collection agent and data computation agent. The task agents are responsible for the completion of job the user wants to complete. Computation agents perform the desired computation in single hop or multi-hop fashion. Data collection agents responsible for data state collection.
PROPOSED IDEA
Our proposed scheme firstly watermark the computation results of the mobile agent at a host i using the transformation in Eq. 1-4. The details of watermark embedding process are described in the Table 1. We represent these watermark results by Rw. For the watermarking purpose we used Tian`s expansion algorithm (Tian, 2001). Tian`s expansion algorithm is defined for 8-bit pixels images. Since we are dealing with data collected by mobile agents, we will be using that algorithm for 128 ASCII values. For that we have modified the limits to 0→127 to avoid overflow and underflow.
![]() | (1) |
h = x – y | (2) |
![]() | (3) |
y` = x` – h` | (4) |
The watermark embedding process can be seen in example in Table 1 below. After watermarking the results we use RSA based digital signature to digitally sign these watermarked results. We make an assumption here that since these results are collected at this host there is no point of hiding them from the current host in other words the results collected by a mobile agent at a host Hi the host Hi is considered as trusted to a certain extent but not completely e.g., for producing digital signature and not to the point after the agent has obtained them etc. But not for the results collected at host Hi-1 or Hi+1. So we can compute the hash of these results at host Hi-1. Then the host Hi produces a pair of public and private key. The private key is used to sign the hash to produce the signature. The public key is given to the mobile agent to be used later at the origin platform for signature verification. After embedding the watermark in the results, signing the results and giving the public key to the mobile agent, the mobile agent can visit the next host Hi+1 in its itinerary. When the mobile agent returns to the origin platform we recompute the signature using the public key of each host and compare with the signature previously produced at the remote host. If the signature matches with the previously stored signature we say the results are not tampered so we can extract the watermark using the transformation in Eq. 5-8:
![]() | (5) |
h` = x – y` | (6) |
![]() | (7) |
y = x – h` | (8) |
The watermark extraction process can be shown in Table 2.
Mobile agent watermarking: Mobile Agent Watermarking is a technique for protecting the computation results of mobile agents by using digital watermarking. The idea of using watermarking for mobile agents protection was initially given by Esparza et al. (2003), but there is no experimental evidence of their work. Esparza gave no explanation about how the watermarks are actually embedded and retrieved and what is the effectiveness of this technique. We believe that Tian`s expansion algorithm can be successfully implemented for the purpose of watermarking the computation results of mobile agent. There are two main reasons for selecting Tian`s algorithm. First of all it is simple and easy to understand and it can be fully implemented in software thus making it ideal for mobile agents.
Security model: In order to test the proposed idea we have implemented a simple Ticket Booking Agent. The primary goal is to make sure that the partial results collected by mobile agent are in contact and any modification or tampering can be detected by the originator. The owner of the agent wants to fly say from Beijing to Hong Kong on next weekend. The owner of the agent wants to buy the cheapest ticket. The owner sends his mobile agent to various airline agencies which are providing the ticket service. The owner sends his agent with his desired preferences to various airlines servers to check the availability of the ticket, the price as well as other relevant information e.g. departure time, arrival time, flight is direct or number of stops etc. The agent queries the servers and return to the originator with the results of its computation. In order to get the best suitable price of tickets for its owner the agent must keep the prices/data collected at all the hosts. When a mobile agent collects price from one host say Si and move to the next host Si+1, the price of the former host Si must be kept secret from the later sever otherwise the later host may take advantage e.g. offering a false offer or modifying previously stored offers. The host Si+1 may offer a price that is not the actual price offered by it or in worst case it can modify the price collected prior to visiting si+1 in order to get unfair advantage. Mobile agent must be protected against such attacks.
Table 1: | Watermark embedding process |
![]() |
Table 2: | Watermark extraction process |
![]() |
The main objectives of present study are confidentiality and integrity. Confidentiality here means to reveal cleartext only at trusted hosts. Integrity means the agent must be protected such that it can collect new data set at each host they visit but also any tampering with the pre-existing collected data set must be detected by any trusted host.
Security properties: Karjoth et al. (1998) have defined a set of security properties which are considered as the basic guidelines for the data integrity mechanism. Here we took the liberty of modifying the original text slightly. While defining these properties Karjoth assumed that a malicious host has captured the agent containing a set of encapsulated offers O1, O2, ..., Om where m<=n and Om is the last host visited by the agent before being captured.
Forward integrity: According to Yee (1999), none of the partial results collected prior to a malicious host can be modified without detection. If a mobile agents visits a number of hosts S1, S2, ..., Sn and the first malicious host is Sm where 1<=m<=n-1 then none of the partial results collected at hosts Si(i<=m) can be undetectably modified by a malicious host.
Strong forward integrity: If a mobile agent visits a number of hosts S1, S2, ..., Sn and the first malicious host it encounters is Sm then none of the encapsulated offer Ok where k>m can be modified.
Insertion resilience: Only hosts that are authorized to insert offers can add the offers.
Non-repudiation: No hosts can deny the offers that it made to a visiting agent.
Cryptographic notations:
S0 | = | Originator |
Si(i>=1) | = | Intermediate hosts |
Oi, 1<=i<=n | = | Actual offer at host Hi |
Oi | = | Encapsulated offer |
W(oi) | = | Watermarked offer/results |
Hi(W(oi)) | = | Cryptographic hash produced at host Hi |
(K1)i | = | Private Key produced at host Hi |
(K2)i | = | Public Key produced at host Hi |
![]() | = | Signature Produced |
Setup on origin: Ωi Set of encapsulated offers
S0 → S1:
W0 | = | θ {set of offers} |
Ω0 | = | θ{set of encapsulated offers} |
Initial visit on a host:
W(O)i = Embed Watermark (O)i
Hi = h(W(O)i) {Cryptographic hash of watermark offer}
![]() |
Protocol: The mobile agent partial is described in Fig. 1.
![]() |
Watermark embedding algorithm:
(1)R = C0, C1, ...., Cn-1, Cn
![]() | |
Fig. 1: | Mobile agent collecting partial results |
(2) | (x, y) = (C0, C1) |
(3) | ![]() |
(4) | Expand h into its binary representation h = rm, rm-1, ..., r1, r0 |
(5) | Embed the watermark bit after MSB bit and right shift all the bits one bit. |
hw = rm, bw, rm-2, rm-3, ..., r1, r0 | |
Where bw = {0, 1} | |
(6) | h` = Interger (hw) |
(7) | ![]() |
(8) | ![]() |
(9) | ![]() |
In above algorithm C0, C1, ..., Cn-1, Cn represent the results collected by mobile agent. R is a set consisting of the ASCII values of these results. After this we pick a pair x and y. In Step 3 we compute the values of difference and average for the first pair. The value of difference is expanded to its binary representation and then a watermark bit is embedded after the MSB-bit. The watermarked difference value hw is then converted to its integer value h/. The new values (x/ and y/) of x and y are computed based on the value of h/. At the end we concatenate the pair x/ and y/. Next we pick the second pair (C2, C3) and repeat the steps from 2 to 9. We are done when all the pairs are finished.
Signature verification algorithm: The way we create and verify digital signature is stated in the following algorithm lets suppose that k1 Private Key and K2 is the Public Key
(1) | Calculate the hash of watermark results using Hash Algorithm (e.g., SHA-1) |
i.e., ![]() |
(2) | Using RSA Private Key k1 encrypt the hash i.e.,![]() |
(3) | For Verification re-compute the hash using same algorithm ![]() |
(4) | Encrypt the signature using public key of RSA i.e., ![]() |
(5) | If S1 = S2 verify otherwise reject. |
IMPLEMENTATION AND
EXPERIMENTAL RESULTS
We have implemented the proposed idea using IBM Aglets. For cryptographic primitives we have employed JCE/JCA. The provider we have selected is Bouncy Castle Provider (Hook, 2005). Aglet is an open source framework developed by IBM Tokyo Research Laboratory (TRL). Mobile agents in IBM Aglets are called Aglets.
![]() | |
Fig. 2a: | Execution time with various hash algorithms |
![]() | |
Fig. 2b: | RSA signature creation time for various hash algorithms |
![]() | |
Fig. 2c: | Total execution time |
Aglets are fully written in java. The Aglets platform provides many services like mobility, communication between aglets etc. Agent programming with aglets is based on event-driven programming, reacting on when it received a specific message (Lange and Oshima, 1998). We have performed the experiments in a windows based environment with five Pentium IV, 3.01 GHZ Processor, 512MB RAM computer for the remote and home computers (agent`s home). We have used RSA based signature algorithm with various types Hash algorithms like SHA-1, SHA-256 and SHA-512. Initially we keep the key size to 512-bits and then gradually increase it for different experimental purposes. We increase key size to 1024-bits, 1536-bits and 2048-bits. We compute the overhead on the remote host by calculating the time to generate digital signature and total execution time (turn around time) with variable key size. Figure 2a shows the execution time for RSA algorithm on remote hosts using variable size key. We can see that as we increase the key size the time to create the signature also increases. But for stronger security we need to have a key size to be resistant enough against attacks. We can see that the execution time for SHA-1 is less than other hash algorithms as we increase the key size. Figure 2b describes the signature creation time for RSA Algorithm with variable key size. RSA with SHA-256 has the largest time to generate the signature. SHA-512 has comparably less time but it requires a key size of at least 1024 bits. RSA with SHA-1 is the fastest one and takes less time as compared to other two hash algorithms to generate signature. Figure 2c presents the total turn around time as the mobile agent visits more hosts this time increases. In case of SHA-1 the execution time is less compared to other algorithms. In case SHA-256 total turn around time increases rapidly. But in case of SHA-512 this time is still less than SHA-256. So we can see that SHA-1 performs better than SHA-256 and SHA-512. But as we know there are some collision detected in SHA-1 so its use is not recommended anymore. We have used this only for experimental purposes just to give a comparison of different hashing algorithm with RSA Digital Signature.
As present experimental shows that this framework can be implemented efficiently with little load on the processing. We also notice that the watermark extraction is independent of the key size. As the Signature verification and watermark extraction is carried out at the agent owner host so we can increase the key size more but that will put an extra burden on the remote hosts for signature creation.
EVALUATIONS
Significance differences are determined by applying a paired sample t-test. Table 3-5 show significant difference among the three hash algorithms.
![]() | (9) |
It follows the t-distribution with the degree of freedom n-1:
Where:
![]() |
Table 3: | t-test on the signature creation time for RSA with SHA-1, SHA-256 and SHA-512 |
![]() |
Table 4: | t-test on the execution time for RSA with SHA-1, SHA-256 and SHA-512 |
![]() |
Table 5: | t-test on the total turn around time for RSA with SHA-1, SHA-256 and SHA-512 |
![]() |
Thus, we obtain the following results as mentioned in Table 3 and 4 with level of significant 0.01 and 0.05. We can see that there is a significant difference in the various hash algorithms when used for RSA-signature. The execution time is critical in our case as we do not want to put a lot of burden on the executing host. But as we can see there is some time consumed by the agent at the remote hosts for key generation and execution. The total turn around time is the total time consumed by the mobile agent from start to end i-e. The time from when it leaves the home platform to the time it comes back to home platform after executing there. As we can see that this time increases gradually as the number of host increases. Our proposed scheme does not suffer from cut and paste attacks as mentioned in (Roth, 2001). It is computationally infeasible to find a collision in the hash function thus providing stronger protection even against the most powerful attackers. We understand that the watermarks can be added, removed or modified. This can be avoided by using hash functions justifying our use of them. The host can not repudiate from the results produced by agent and the owner of the agent can verify the authenticity of the results by re-computing the hash value. The framework is flexible enough as we can implement different types of stronger watermarking algorithms.
CONCLUSIONS
Mobile agents offer a lot of advantages but their use is limited mainly because of the security problems associated with them. Security in mobile agent system can be divided into two types (1) security of host from malicious mobile agent (2) security of mobile agent from malicious host. The second type of security can further be divided into two subtypes (1) Security of static code (2) Security of dynamic data state. The security of the dynamic data state is still an open problem of research. In this paper we proposed a method of protecting the computation results of the mobile agent. Our proposed scheme uses digital watermarking and digital signature. We first embed a watermark in the results on each host. Then these watermarked results are used as input data to a hash function producing hash value. This hash value is then signed by each host on which it is produced as the mobile agent traverses it forming a digital signature. When the agent returns to the home platform we verify the signature. Any tampering with the results can be readily detected by hash function. We have implemented 3 different types of hash functions SHA-1, SHA-256 and SHA-512 that can work with RSA. We compare the performance of these hash functions so as to determine the load on each host. The experimental results give a measure of the overhead of the framework on executing platform. Unlike other proposed methods like PRAC, set authentication code etc our method does not suffer form the attacks identified like cut and paste and oracle attacks. The reason for that is the computational infeasibility of producing a hash that collides with hash produced at each host. However some questions are still left unanswered for future research, more specifically those regarding the protection of the watermarking algorithm. A realistic solution is still needed to protect the code that watermarks the agent`s results from reverse engineering attacks. Those issues are beyond the scope of our research but future research can focus on these problems more deeply and efficiently.
ACKNOWLEDGMENTS
This study was supported by the National Natural Science Foundation of China (60671064), the Chinese national 863 high-tech projects (2007 AA01Z458, 2005AA733120), the Science Foundation of Guangdong Province (05109511), the Society Development plan of Guangdong Province (2006B37430001), the Foundation for the Author of National Excellent Doctoral Dissertation of China (FANEDD-200238), the Scientific Research Foundation of Harbin Institute of Technology (HIT.2003.52), the Science of the Foundation for the Excellent Youth of Heilongjiang Province and the Program for New Century Excellent Talents in University (NCET-04-0330). Ph.D scholarship for Mr. Abid Khan is provided by COMSATS Institute of Information Technology (CIIT), Pakistan.
REFERENCES
- Corradi, A., R. Montanari and C. Stefanelli, 1999. Mobile agents protection in the Internet environment. Proccedings of the 23rd International Computer Software and Applications Conference, October 27-29, 1999, Phoenix, AZ., USA., pp: 80-85.
CrossRef - Esparza, O., M. Fernandez, M. Soriano, J.L. Munoz and J. Forne, 2003. Mobile agent watermarking and fingerprinting: Tracing malicious hosts. Lecture Notes Comput. Sci., 2736: 927-936.
CrossRef - Hohl, F., 2000. A framework to protect mobile agents by using reference states. Proceedings of the 20th International Conference on Distributed Computing Systems, April 10-13, 2000, Washington, DC., USA., pp: 410-419.
Direct Link - Karjoth, G., N. Asokan and C. Gulcu, 1998. Protecting the computation results of free-roaming agents. Lecture Notes Comput. Sci., 1477: 195-207.
Direct Link - Lin, H.C., S.M. Yen and H.S. Chen, 2004. Protection of mobile agent data collection by using ring signature. Proceedings of the International Conference on Networking, Sensing and Control, March 21-23, 2004, ISA., pp: 659-664.
CrossRef - Rivest, R.L., S. Adi and T. Yael, 2001. How to Leak a Secret. Lecture Notes Comput. Sci., 2248: 552-565.
CrossRef - Roth, V., 1999. Mutual protection of co-operating agents. Lecture Notes Comput. Sci., 1603: 275-285.
CrossRef - Roth, V., 2001. On the robustness of some cryptographic protocols for mobile agent protection. Lecture Notes Comput. Sci., 2240: 1-14.
CrossRef - Tian, J., 2002. Wavelet-based reversible watermarking for authentication. Proceedings of the Security and Watermarking of Multimedia Contents IV, January 19, 2002, San Jose, CA., USA., pp: 679-690.
CrossRefDirect Link - Vigna, J., 1998. Cryptographic traces for mobile agents. Lecture Notes Comput. Sci., 1419: 137-153.
Direct Link