Abstract
E-commerce can be implemented using mobile agent paradigm which is considered as an extension to distributed system approach. Mobile agent paradigm is an approach where a source node generates a software program (mobile agent) to be released through nodes (vendors); collecting offers regarding the application’s criteria and finally returning back to the source. According to the mobility of mobile agent, it is vulnerable to various penetrations of malicious nodes; a well-known vulnerability is the truncation attack. This paper proposes a new protocol (Co-T1) which leverages the protection of collected offers and restoring hacked information of mobile agent without recycling it. The proposed protocol relies on the negotiation of co-operating mobile agents for satisfying the integrity of collected offers, where the source node releases the co-operating agents that consist of two types of agents; one agent (bid-agent) to collect offers and uses the notion of publicly verified chained signature [2], and the other agent (monitoring-agent) to generate a one time public/private key pair that is applied for signature and to restore hacked information of the bid-agent.
Published Version
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have