IEEJ Transactions on Electronics, Information and Systems
Online ISSN : 1348-8155
Print ISSN : 0385-4221
ISSN-L : 0385-4221
Special Issue Paper
A Proposal of Replica Management Based on MIC Method Suitable for Mobile Computation Environments
Yasukuni OkatakuNobukazu YoshiokaShinichi Honiden
Author information
JOURNAL FREE ACCESS

2003 Volume 123 Issue 4 Pages 670-676

Details
Abstract
We propose a fault-tolerant mechanism based on message integrity code (MIC) method for mobile agent authentication under non-secured network environment. We introduce one or more secured nodes (OASIS NODE) and a mobile agent (FT_Agent) having a replica management mechanism. We assume that the candidate agents for authentication are safely stored in an OASIS NODE and a shared secret key is safely distributed to user terminals from the OASIS NODE at the beginning. When the replica agents on user terminals need their authentication, they calculate MIC by using the shared secret key and move themselves having the MIC to the OASIS NODE, which verifies the MIC. The FT_Agents which are also verified by an OASIS NODE are distributed to the each agent and dynamically manage active replicas and passive replicas. By introducing the MIC method and the replica management mechanism, a secured fault-tolerant system suitable for mobile agents under non-secured network environment can be constructed.
Content from these authors
© 2003 by the Institute of Electrical Engineers of Japan
Previous article Next article
feedback
Top