Abstract
The Personal Mobility Management System (PMMS), an agent-based message-oriented mobile computing application developed at Multimedia and Mobile Agent Research Laboratory, aims to provide personalized services and resources access to its nomadic users within a virtual network across different organizations. This paper analyses and discusses the security weaknesses exposed in the system architecture, then proposes several security frameworks to overcoming these security concerns. The paper tries to address and provide a general architectural solution to ensure secure communications for a typical message-oriented mobile computing system.
Similar content being viewed by others
References
ANSI X3.92, American National Standard for Data Encryption Algorithm (DEA), American National Standards Institute, 1981.
J. Bradsahaw, Software Agents, AAAI Press/The MIT Press, Cambridge, MA, 1997.
D.E. Denning, Cryptography and Data Security, Addison-Wesley Publishing Company, Reading, MA, 1982.
A. Hooda, A. Karmouch, and S. Abu-Hakima, “Nomadic support using agents,” in 4th International Symposium on Internetworking, Ottawa, July 1998.
http://www.Mitel.com, “The MicMac softwareTestbed,”Technical Report, Mitel-CATA, Kanata, ON, Canada, 1996.
Y. Labrou, J. Mayfield, and T. Finin, “KQML as an agent communication language,” in Proceedings of the 3rd International Conference on Information and Knowledge Management (CIKM'94), ACM Press, New York, NY, Nov. 1994.
R.S. Macgregor, A. Arest, and A. Siegert, WWW Security—How to Build a Secure World Wide Web Connection, Prentice Hall, Upper Saddle River, NJ, 1996.
National Institute of Standards and Technology, NIST FIPS PUB 186, Digital Signature Standard, U.S. Department of Commerce, May 1994.
Network Working Group, Lightweight Directory Access Protocol (v3), RFC 2251, IETF, Dec. 1997.
S. Oaks, Java Security, O'Reilly & Associates, Sebastopd, CA, May 1998.
R. Oppliger, Authentication System for Secure Networks, Artech House INC, Boston, MA, 1996.
R.L. Rivest, The MD4 Message Digest Algorithm, RFC 1320, April 1992.
R.L. Rivest, The MD5 Message Digest Algorithm, RFC 1321, April 1992.
R.L. Rivest, A. Shamir, and L.M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, Vol. 21, No. 2, pp. 120–126, Feb. 1978.
B. Schneier, Applied Cryptography, second edition, John Wiley & Sons, New York, NY, Dec. 1995.
G.J. Simmons, Contemporary Cryptology—The Science of Information Integrity, IEEE Press, Piscataway, NJ, 1992.
O. Spaniol, A. Fasbender, S. Hoff, J. Kaltwasser, and J. Kassubek, “Impacts of mobility on telecommunication and data communication networks,” IEEE Personal Communications, Oct. 1995.
W. Tuchman, “Hellman presents no shortcut solutions to DES,” IEEE Spectrum, Vol. 16, No. 7, pp. 40–41, July 1979.
J. Vitek, “Security and communication in mobile object systems,” in Mobile Object Systems: Towards The Programmable Internet: Second International Workshop, MOS' 96, Linz, Austria, July 8–9, 1996: Selected Presentations and Invited Papers, Springer: New York, 1997, pp. 177–200.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Cui, Z., Karmouch, A., Impey, R. et al. Approaching Secure Communications in a Message-Oriented Mobile Computing Environment. Multimedia Tools and Applications 13, 147–163 (2001). https://doi.org/10.1023/A:1009637126236
Issue Date:
DOI: https://doi.org/10.1023/A:1009637126236