Hierarchical key management scheme for securing mobile agents with optimal computation time
2012 (English)In: International Conference on Modelling Optimization and Computing, Elsevier, 2012, Vol. 38, 1432-1443 p.Conference paper (Refereed)
The Mobile agents are well suited for accessing contents of distributed web based applications including internet business. Such kinds of access must be secure enough enabling only authorized mobile agents to retrieve the contents from the distributed servers. This kind of security is provided by several algorithms including RSA based digital signature and elliptic curve digital signature cryptography. The main differences among the algorithms of the past literatures lie in the computational time of encryption and decryption of the keys used for encrypting and decrypting the content. In this paper we propose a modified hierarchical date constrained key management scheme which potentially reduces the overall computation time needed for key derivation and key signature check operations. Different algorithms are compared with our proposed mechanism and the experimental results show that the proposed method reduces the overall key derivation and key signature check computational time.
Place, publisher, year, edition, pages
Elsevier, 2012. Vol. 38, 1432-1443 p.
, Procedia Engineering, ISSN 1877-7058 ; 38
Access control, Computation time, Distributed web applications, Elliptic curve digital signature, Mobile agents
IdentifiersURN: urn:nbn:se:kth:diva-165126DOI: 10.1016/j.proeng.2012.06.177ISI: 000315044701054ScopusID: 2-s2.0-84900988462OAI: oai:DiVA.org:kth-165126DiVA: diva2:807799
International Conference on Modelling Optimization and Computing, 10 April 2012 through 11 April 2012, TamilNadu, India
QC 201504242015-04-242015-04-232015-04-24Bibliographically approved