[go: up one dir, main page]

CN1744523A - A security protection method for mobile agent network management - Google Patents

A security protection method for mobile agent network management Download PDF

Info

Publication number
CN1744523A
CN1744523A CN 200510094032 CN200510094032A CN1744523A CN 1744523 A CN1744523 A CN 1744523A CN 200510094032 CN200510094032 CN 200510094032 CN 200510094032 A CN200510094032 A CN 200510094032A CN 1744523 A CN1744523 A CN 1744523A
Authority
CN
China
Prior art keywords
mobile agent
data
network management
java card
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510094032
Other languages
Chinese (zh)
Other versions
CN100369421C (en
Inventor
王汝传
陈志�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CNB2005100940323A priority Critical patent/CN100369421C/en
Publication of CN1744523A publication Critical patent/CN1744523A/en
Application granted granted Critical
Publication of CN100369421C publication Critical patent/CN100369421C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

In hardware, smart cart is adopted as reliable execution environment of mobile agent; and in software, encryption techniques are adopted to ensure confidentiality and security of mobile agent and information of administer of network. Under management of validity and verification, executing task of managing network, the mobile agent is divided into public and private codes and data, which are protected by conventional encryption / decryption algorithm and encryption / decryption algorithm in published cryptographic key / secret code system. Kernel portion of mobile agent is executed in smart cart. From hardware and software synthetically, the method guarantees security of network management of mobile agent, lowers difficulty of security and protection, increases flexibility, configurability and expandability.

Description

一种面向移动代理网管的安全保护方法A security protection method for mobile agent network management

技术领域technical field

本发明是一种分布式计算技术应用于开放网络环境的安全解决方案。主要用于解决基于移动代理的网络管理的安全问题,属于计算机网络、分布式计算和信息安全的交叉技术领域。The invention is a security solution for applying distributed computing technology to an open network environment. It is mainly used to solve the security problems of network management based on mobile agents, and belongs to the cross-technical field of computer network, distributed computing and information security.

背景技术Background technique

当前的网络管理方案,大部分的网络管理计算都由网络管理站来完成。采用这种方式进行网络管理时,管理站和被管理节点之间大量的信息交换造成网络带宽的极大浪费,而且这种方案也不能动态地扩展服务器方的能力。采用移动代理这种分布式计算技术可以缓解以上的不足。移动代理是一个软件实体,拥有一定的智能和判断能力,它可以在异构的网络上按照一定的规程迁移,寻找合适的资源,本地化处理或使用这些资源,代表用户完成特定的网管任务。In the current network management solution, most of the network management calculations are completed by the network management station. When using this method for network management, a large amount of information exchange between the management station and the managed nodes will cause a great waste of network bandwidth, and this solution cannot dynamically expand the server's ability. The above shortcomings can be alleviated by adopting the distributed computing technology of mobile agent. A mobile agent is a software entity with certain intelligence and judgment capabilities. It can migrate on a heterogeneous network according to certain procedures, find suitable resources, process or use these resources locally, and complete specific network management tasks on behalf of users.

移动代理网管方案由具有移动代理执行环境的网络管理站、被管理节点和执行网管任务的移动代理三个部分组成。网络管理站根据管理任务生成并派遣移动代理,处理它所返回的结果。移动代理在各个被管理节点迁移并收集处理信息,进行网管操作。被管理节点上存在移动代理执行环境,执行环境接受移动代理并且协助其对本地资源的访问。在移动代理网管方案中,网络管理站派遣相应的移动代理到各个被管理节点执行管理任务;这些移动代理在每一个被管理节点完成管理任务后携带相关的信息返回管理站,或者依次迁移到多个被管理节点分别完成相应的管理任务后返回管理站,或者遍历所有的被管理节点再返回管理站。The mobile agent network management solution consists of three parts: a network management station with a mobile agent execution environment, a managed node, and a mobile agent performing network management tasks. The network management station generates and dispatches mobile agents according to management tasks, and processes the results it returns. The mobile agent migrates at each managed node, collects and processes information, and performs network management operations. There is a mobile agent execution environment on the managed node, which accepts the mobile agent and assists it in accessing local resources. In the mobile agent network management solution, the network management station dispatches corresponding mobile agents to each managed node to perform management tasks; these mobile agents carry relevant information back to the management station after each managed node completes the management task, or migrate to multiple nodes in turn. Each managed node returns to the management station after completing the corresponding management tasks, or traverses all the managed nodes and then returns to the management station.

移动代理网管方案具有网络负载小、应变能力强、处理实时性高等优点。但移动代理技术本身的安全性以及在网络管理应用中出现的安全隐患阻碍了这种网管方案的实际应用和发展。The mobile agent network management solution has the advantages of small network load, strong adaptability, and high real-time processing. But the security of the mobile agent technology itself and the potential safety hazards in the application of network management hinder the practical application and development of this network management solution.

网络管理中移动代理面临的安全威胁分析Analysis of Security Threats Faced by Mobile Agents in Network Management

在网管过程中,不断迁移的移动代理可能存在的安全威胁主要有In the process of network management, the possible security threats of mobile agents that are constantly migrating mainly include:

(1)被动攻击:恶意攻击节点并不干预传输中的移动代理,而是①截获(窃听)其代码和数据,②进行流量分析(如分析移动代理传输频度和长度),从而获取所需的敏感信息。(1) Passive attack: The malicious attack node does not interfere with the mobile agent in transmission, but ① intercepts (eavesdrops) its code and data, and ② conducts traffic analysis (such as analyzing the transmission frequency and length of the mobile agent), so as to obtain the required sensitive information.

(2)主动攻击:①中断:破坏被管理网络的资源或者使其变得不可用。②篡改与重发:移动代理到达目的地之前被恶意节点截获,该节点就可能修改移动代理的代码或数据,然后再发送给目的地节点,从而可能导致对网络配置和管理参数的非法改变。另外,该恶意节点也可能只在适当的时候重发该移动代理(如含有重启某个设备的操作等),则也可能给网络管理和被管理网络造成破坏。③假冒:恶意节点伪装成合法节点,利用假冒的移动代理进行非授权的网管活动。(2) Active attack: ① Interruption: Destroy the resources of the managed network or make them unavailable. ② Tampering and retransmission: If the mobile agent is intercepted by a malicious node before it reaches the destination, the node may modify the code or data of the mobile agent and then send it to the destination node, which may lead to illegal changes to network configuration and management parameters. In addition, the malicious node may only resend the mobile agent at an appropriate time (such as including the operation of restarting a certain device, etc.), which may also cause damage to the network management and the managed network. ③Counterfeiting: Malicious nodes pretend to be legitimate nodes and use fake mobile agents to conduct unauthorized network management activities.

被管理节点面临的安全威胁分析Analysis of security threats faced by managed nodes

在网管过程中,被管理节点允许执行不同网管任务的移动代理在其上运行,这使其面临各种恶意移动代理(例如,被篡改、伪装和重发的移动代理)带来的可能攻击。恶意的移动代理可以携带非法代码破坏被管理节点提供的服务、破坏被管理节点的运行,甚至可以完全终止该节点。它还可以通过消耗大量被管理节点的资源(如硬盘空间、内存、网络端口等)来发动拒绝服务的攻击以使其无法完成正常业务。一个已经访问被管理节点的移动代理如果对它的服务没有经过授权,就会伤害到其它移动代理和被管理节点本身。所以被管理节点必须保证每个移动代理不会读写到它授权以外的数据,而对于合法的移动代理,被管理节点也应给予足够的资源访问权限。In the process of network management, the managed node allows mobile agents that perform different network management tasks to run on it, which makes it face possible attacks from various malicious mobile agents (eg, tampered, disguised and retransmitted mobile agents). Malicious mobile agents can carry illegal codes to destroy the service provided by the managed node, destroy the operation of the managed node, and even terminate the node completely. It can also launch a denial of service attack by consuming a large number of managed node resources (such as hard disk space, memory, network ports, etc.) so that it cannot complete normal business. If a mobile agent that has visited the managed node has not authorized its service, it will harm other mobile agents and the managed node itself. Therefore, the managed node must ensure that each mobile agent will not read and write data beyond its authorization, and for legal mobile agents, the managed node should also give sufficient resource access rights.

网络管理站面临的安全威胁分析Analysis of Security Threats Faced by Network Management Station

网络管理站是执行网管任务的移动代理的创建者和最初传输者,它还需要接受完成任务后返回的移动代理,提取信息,检查管理任务的执行情况,监控和维护整个被管理网络的运行状况。在网管过程中,管理站面临的安全问题是①返回的移动代理含有的恶意的代码,②移动代理所带回的数据被篡改或伪造。当然,管理站的安全保护在很大程度上必须依赖于移动代理在传输过程中和被管理节点上的安全保护问题的解决。The network management station is the creator and initial transmitter of the mobile agent that performs network management tasks. It also needs to accept the mobile agent returned after completing the task, extract information, check the execution of the management task, monitor and maintain the operating status of the entire managed network . In the process of network management, the security problems faced by the management station are ① the malicious code contained in the returned mobile agent, and ② the data brought back by the mobile agent is tampered or forged. Of course, the security protection of the management station must depend on the resolution of the security protection issues of the mobile agent during transmission and on the managed node to a large extent.

发明内容Contents of the invention

技术问题:本发明的目的是提供一种面向移动代理网管的安全保护方法,解决基于移动代理网管所出现的安全问题,构建一个安全体系结构,利用智能卡技术和加密技术对网络管理站、被管理节点、移动代理以及网络管理过程实施硬件和软件的安全保护。Technical problem: the purpose of this invention is to provide a kind of safety protection method facing mobile agent network management, solve the safety problem that occurs based on mobile agent network management, build a security system structure, utilize smart card technology and encryption technology to network management station, managed Nodes, mobile agents, and network management processes implement hardware and software security protection.

技术方案:本发明的方法是一种改进性和综合性的方法,通过对基于检测的、基于硬件的、主动的安全保护措施的改进和综合而提出,在硬件上采用Java卡(一种能运行Java程序的智能卡,它遵从所有的智能卡标准)作为移动代理可信赖的执行环境,在软件层次上采用加密技术保障移动代理和网管信息的机密性和可靠性。Technical solution: the method of the present invention is an improved and comprehensive method, which is proposed by improving and synthesizing the detection-based, hardware-based, active safety protection measures. The smart card running the Java program, which complies with all smart card standards) is used as a reliable execution environment for the mobile agent, and encryption technology is used at the software level to ensure the confidentiality and reliability of the mobile agent and network management information.

一、体系结构1. Architecture

在移动代理网管方案中,移动代理在迁移到各个被管理节点完成管理任务,其所执行的代码和数据(这里,数据特指除执行代码以外的信息)可能是相同的(我们称其为公共代码和数据);也可能是不同的(我们称其为私有代码和数据)。其中,公共数据也包含移动代理的所要访问节点目录、路由信息和有关安全的数据等。In the mobile agent network management solution, when the mobile agent migrates to each managed node to complete the management task, the code and data it executes (here, the data specifically refers to the information other than the execution code) may be the same (we call it public code and data); it may also be different (let's call it private code and data). Among them, the public data also includes the list of nodes to be visited by the mobile agent, routing information and data related to security, etc.

移动代理网管安全体系结构有两个部分组成,一个部分在网络管理站,另一部分是在被管理节点。The mobile agent network management security architecture consists of two parts, one part is in the network management station, and the other part is in the managed node.

1.网络管理站安全组成1. The security composition of the network management station

网络管理站是实施网络管理安全保护的中心,负责协调整个管理的安全运行;根据不同的网管任务,产生相应的移动代理并派遣到被管理节点在本地执行具体的管理任务。网络管理站安全组成主要包括四个部分。The network management station is the center for implementing network management security protection, and is responsible for coordinating the safe operation of the entire management; according to different network management tasks, corresponding mobile agents are generated and dispatched to the managed nodes to perform specific management tasks locally. The security composition of the network management station mainly includes four parts.

(1)Java卡管理器(1) Java Card Manager

Java卡管理器为各个节点的Java卡加载各项必要的功能和数据,并提供相应的Java卡证书。Java卡证书里包含下列信息:Java卡的制造商、Java卡的类型、Java卡提供的安全策略以及有关密钥等。当一个Java卡分配给被管理节点,它的Java卡证书要提供给目录管理器。The Java Card Manager loads various necessary functions and data for the Java Cards of each node, and provides corresponding Java Card certificates. The Java Card certificate contains the following information: the manufacturer of the Java Card, the type of the Java Card, the security policy provided by the Java Card, and related keys. When a Java Card is assigned to a managed node, its Java Card certificate is provided to the directory manager.

(2)目录管理器(2) Directory Manager

目录管理器提供一种目录服务。网络管理站和各个被管理节点需要在目录管理器处登记下列参考信息:所在节点的标识符(例如机器名或其他唯一的标识符)及物理网络地址、提供何种安全策略。Java卡管理器为目录管理器提供各个节点的Java卡证书。这些信息用于为网络管理站定位被管理节点、对移动代理进行加密服务。Directory Manager provides a directory service. The network management station and each managed node need to register the following reference information at the directory manager: the identifier of the node (such as machine name or other unique identifier) and physical network address, and what security policy is provided. The Java Card Manager provides Java Card certificates for each node to the Directory Manager. These information are used for locating the managed node for the network management station, and performing encrypted services for the mobile agent.

(3)移动代理执行环境(Mobile Agent Execution Environment,以后简称MAEE)(3) Mobile Agent Execution Environment (hereinafter referred to as MAEE)

在网管过程中,移动代理通过和各个被管理节点交互,完成管理任务,返回管理结果。MAEE对移动代理提供各种功能支持,在安全管理方面,它一方面利用Java卡为移动代理进行有效性管理和加密,另一方面,解密返回管理站的移动代理,提取管理结果信息,主要包括四个部分:移动代理接收接口、管理信息处理模块、密码控制模块、移动代理发送接口。In the network management process, the mobile agent completes management tasks and returns management results by interacting with each managed node. MAEE provides various functional support for mobile agents. In terms of security management, it uses Java cards to manage and encrypt the validity of mobile agents on the one hand. On the other hand, it decrypts mobile agents returned to the management station and extracts management result information, mainly including Four parts: mobile agent receiving interface, management information processing module, password control module, mobile agent sending interface.

所述的移动代理接收接口负责将移动代理输入到网络管理站的Java卡。The mobile agent receiving interface is responsible for inputting the mobile agent to the Java card of the network management station.

所述的管理信息处理模块统计、过滤和综合网络管理站的Java卡所提取的管理结果信息。The management information processing module counts, filters and synthesizes the management result information extracted by the Java card of the network management station.

所述的密码控制模块与目录管理器交互,为Java卡提供必要的密码(管理站中,移动代理加密和解密所涉及的密码很多,考虑到Java卡的存储容量限制和管理站的安全可靠性,这些密码都由目录管理器通过移动代理执行环境提供给管理站的Java卡;而在被管理节点,加密和解密的密码保存在该节点的Java卡中)。Described password control module interacts with directory manager, provides necessary password for Java card (in the management station, mobile agent encryption and decryption involve a lot of passwords, considering the storage capacity limitation of Java card and the security reliability of management station , these passwords are provided to the Java card of the management station by the directory manager through the mobile agent execution environment; and in the managed node, the encrypted and decrypted passwords are stored in the Java card of the node).

所述的移动代理发送接口负责发送从网络管理站的Java卡中所获取的经过加密处理过的移动代理。The mobile agent sending interface is responsible for sending the encrypted mobile agent obtained from the Java card of the network management station.

(4)Java卡(4) Java Card

在网络管理站中,Java卡通过明确的接口与移动代理执行环境进行交互,一方面,它对即将执行网管任务的移动代理进行有效性管理(加上唯一标识符、有效时间戳)和各项加密处理以及设置代理的传输路径;另一方面,Java卡还对返回管理站的移动代理进行解密,然后检查其有效性(通过唯一标识符检查是否重发,通过有效时间戳检查其是否过期),最后Java卡为网络管理站提取管理结果信息。In the network management station, the Java card interacts with the mobile agent execution environment through a clear interface. On the one hand, it manages the validity of the mobile agent that is about to perform network management tasks (plus unique identifiers, valid time stamps) and various Encryption processing and setting the transmission path of the agent; on the other hand, the Java card also decrypts the mobile agent returning to the management station, and then checks its validity (checking whether it is resent by a unique identifier, checking whether it is expired by a valid time stamp) , and finally the Java card extracts the management result information for the network management station.

Java卡提供一个平台,加密、解密、有效性管理和提取信息的活动都能在其中安全地运行。Java卡ROM中最底层代码是访问存储器(包括RAM、ROM和EEPROM)和I/O的设备驱动程序,根据需要,也可能包括访问加密处理器的驱动程序。在这之上的Java卡虚拟机负责控制上层应用程序对Java卡硬件驱动程序的访问。Java卡虚拟机之上就是实现了各种应用程序接口(基本的Java卡应用程序接口和网络管理专用的应用程序接口)的Java中间字节码。最后,实现了Java卡专用功能的应用程序位于最上层。在本发明方法中,这些应用程序包括解密器、有效性管理模块、信息提取模块、加密和传输处理模块。Java Card provides a platform where encryption, decryption, validity management, and information extraction activities can all run securely. The bottom code in the Java Card ROM is the device driver for accessing memory (including RAM, ROM and EEPROM) and I/O, and may also include the driver for accessing the encryption processor as needed. The Java Card virtual machine on top of this is responsible for controlling the access of upper-layer applications to the Java Card hardware driver. On top of the Java Card virtual machine is the Java intermediate bytecode that implements various APIs (basic Java Card APIs and dedicated APIs for network management). Finally, the application programs that implement the Java Card-specific functions are located on the top layer. In the method of the present invention, these application programs include decryptor, validity management module, information extraction module, encryption and transmission processing module.

所述的解密器用常规解密算法解密移动代理的公共数据、用公开密钥密码体制的解密算法对所有节点的私有数据进行解密。The decryptor decrypts the public data of the mobile agent with a conventional decryption algorithm, and decrypts the private data of all nodes with a decryption algorithm of a public key cryptosystem.

所述的有效性管理模块为移动代理和每一个私有代码分别分配一个唯一标识符、在移动代理的公共数据中放入时间戳,或者检查移动代理中的唯一标识符保证信息没有重复、检查时间戳保证信息没有过期。The validity management module assigns a unique identifier to the mobile agent and each private code respectively, puts a time stamp in the public data of the mobile agent, or checks the unique identifier in the mobile agent to ensure that the information is not repeated, and checks the time Stamp to ensure that the information has not expired.

所述的信息提取模块从通过有效性管理验证合法的移动代理中提取公共数据和每一个被管理节点的私有数据。The information extracting module extracts public data and private data of each managed node from mobile agents verified legal by validity management.

所述的加密和传输处理模块用常规加密算法加密移动代理的公共代码和数据,用公开密钥密码体制的加密算法对各个节点的私有代码和数据进行加密,设置移动代理在执行网络管理任务时所要经过的传输路径。The encryption and transmission processing module encrypts the public code and data of the mobile agent with a conventional encryption algorithm, encrypts the private code and data of each node with the encryption algorithm of the public key cryptosystem, and sets the mobile agent when performing network management tasks. The transmission path to be traversed.

2.被管理节点安全组成2. Security composition of managed nodes

(1)MAEE(1) MAEE

在被管理节点中,MAEE为执行网管任务的移动代理提供落脚点,但它不需要处理管理结果信息,也不需要密码控制模块(被管理节点涉及的密码都封装在该节点的Java卡中)。在安全管理方面,它包含三个部分:移动代理接收接口、移动代理发送接口、本地资源控制模块。In the managed node, MAEE provides a foothold for the mobile agent performing network management tasks, but it does not need to process management result information, nor does it need a password control module (the passwords involved in the managed node are all encapsulated in the Java card of the node) . In terms of security management, it includes three parts: mobile agent receiving interface, mobile agent sending interface, and local resource control module.

所述移动代理接收接口负责将移动代理输入到本地被管理节点的Java卡。The mobile agent receiving interface is responsible for inputting the mobile agent to the Java card of the local managed node.

所述的移动代理发送接口负责发送本地被管理节点的Java卡所提交的移动代理。The mobile agent sending interface is responsible for sending the mobile agent submitted by the Java card of the local managed node.

所述的本地资源控制模块控制Java卡对本地被管理节点资源的访问、对被管理对象的读写,协助Java卡完成管理任务,保护本地被管理节点的资源。The local resource control module controls the Java card's access to local managed node resources, reading and writing of managed objects, assists the Java card in completing management tasks, and protects resources of the local managed node.

(2)Java卡(2) Java Card

在被管理节点中,Java卡所实现的功能不同于管理站的Java卡,它主要实施本地的网络管理。被管理节点的Java卡应用程序包括解密器、有效性验证模块、功能提取模块、任务执行器、加密和传输处理模块。In the managed node, the functions implemented by the Java card are different from those of the management station, and it mainly implements local network management. The Java Card application program of the managed node includes decryptor, validity verification module, function extraction module, task executor, encryption and transmission processing module.

所述的解密器用常规解密算法解密移动代理的公共代码和数据、用公开密钥密码体制的解密算法对本地被管理节点的私有代码和数据进行解密。The decryptor decrypts the public code and data of the mobile agent with a conventional decryption algorithm, and decrypts the private code and data of the local managed node with a decryption algorithm of the public key cryptosystem.

所述的有效性验证模块通过检查移动代理和在本地节点中私有代码的唯一标识符验证其是否合法,通过检查时间戳验证查其是否过期。如果验证通过,记录该代理的唯一标识符和本地被管理节点执行代码和数据的唯一标识符并将该代理提交给功能提取模块处理,否则向MAEE报告错误信息。The validity verification module verifies whether it is legal by checking the unique identifier of the mobile agent and the private code in the local node, and verifies whether it is expired by checking the time stamp. If the verification is passed, record the unique identifier of the agent and the unique identifier of the code and data executed by the local managed node and submit the agent to the function extraction module for processing, otherwise report an error message to MAEE.

所述的功能提取模块从验证通过的移动代理中,提取在本地被管理节点执行的代码和数据。The function extracting module extracts the code and data executed on the local managed node from the verified mobile agent.

所述的任务执行器在MAEE的协助下,执行网管任务。The task executor performs network management tasks with the assistance of MAEE.

所述的加密和传输处理模块:卸解废弃的代码和数据(只在本节点执行的代码,一些不再使用的公共代码和数据),重新组合移动代理,对变化部分和执行结果重新加密,并为MAEE传输该代理提供信息。The encryption and transmission processing module: dismantling obsolete codes and data (codes that are only executed on this node, some public codes and data that are no longer used), recombining the mobile agent, re-encrypting the changed parts and execution results, And provide information for MAEE to transmit this agent.

二、安全机制2. Security Mechanism

1.硬件保护机制1. Hardware protection mechanism

本发明方法采用硬件保护机制,给移动代理额外配备一个硬件,该硬件不受节点和移动代理执行环境的控制,但可以执行移动代理,通过消息与不可信赖环境交互完成管理任务。这种机制为移动代理提供一个安全的运行环境,并保护了节点的资源。The method of the invention adopts a hardware protection mechanism, and an additional piece of hardware is equipped for the mobile agent. The hardware is not controlled by the node and the execution environment of the mobile agent, but can execute the mobile agent, and complete management tasks by interacting with the untrustworthy environment through messages. This mechanism provides a safe operating environment for mobile agents and protects the resources of nodes.

本发明方法采用的硬件是Java卡,它在智能卡ROM中实现了一个Java虚拟机,该虚拟机将执行一个Java字节码的子集,提供外部可以访问的功能,负责控制对智能卡资源的访问(如内存和I/O)。The hardware that the inventive method adopts is Java card, and it has realized a Java virtual machine in smart card ROM, and this virtual machine will carry out a subset of Java byte code, provides the function that can be accessed outside, is responsible for controlling the access to smart card resource (such as memory and I/O).

Java卡完成的功能有The functions completed by the Java Card are

(1)加密和解密移动代理,(1) encrypt and decrypt the mobile agent,

(2)验证移动代理的合法身份、唯一性和时间有效性,(2) Verify the legal identity, uniqueness and time validity of the mobile agent,

(3)执行网管任务,(3) Execute network management tasks,

(4)提取管理结果信息(在网络管理站中)。(4) Extract management result information (in the network management station).

不论在网络管理站中,还是在被管理节点中,Java卡不受本地节点控制,通过与MAEE的交互完成网管任务;被管理节点不能更改移动代理的代码和数据,移动代理也只能根据自己的权限,获取节点的资源,进行合法的网络管理。No matter in the network management station or in the managed node, the Java card is not controlled by the local node, and completes the network management task through the interaction with MAEE; the managed node cannot change the code and data of the mobile agent, and the mobile agent can only authority, obtain node resources, and perform legal network management.

2.加密和数字签名机制2. Encryption and digital signature mechanism

本发明方法采用常规密钥密码体制的加密解密算法和公开密钥密码体制的加密解密算法对移动代理不同代码和数据部分进行加密,并实现数字签名。The method of the invention adopts the encryption and decryption algorithm of the conventional key encryption system and the encryption and decryption algorithm of the public key encryption system to encrypt different codes and data parts of the mobile agent, and realize digital signature.

(1)公共代码和数据要被所有的被管理节点执行,只用常规密钥密码体制的加密解密算法进行加密和解密;(1) The public code and data shall be executed by all managed nodes, and only the encryption and decryption algorithm of the conventional key cryptosystem is used for encryption and decryption;

(2)私有数据和代码属于各个被管理节点,采用公开密钥密码体制的加密解密算法对其进行加密和解密,被管理节点的私有代码和数据用加密密钥加密后,只能由所属的合法的被管理节点(或网络管理站,当管理站需要提取被管理节点的私有的管理结果信息)用解密密钥进行解密。在被管理节点,私有代码和数据以及一些公共代码和数据不再被使用时,从移动代理卸解掉,而产生的私有数据用该节点的加密密钥进行加密;(2) The private data and codes belong to each managed node, which is encrypted and decrypted using the encryption and decryption algorithm of the public key cryptography system. After the private code and data of the managed nodes are encrypted with the encryption key, they can only be encrypted by The legitimate managed node (or network management station, when the management station needs to extract the private management result information of the managed node) decrypts with the decryption key. When the managed node, private code and data and some public code and data are no longer used, it is unloaded from the mobile agent, and the generated private data is encrypted with the encryption key of the node;

(3)新产生的公共管理结果数据以及剩下的公共代码和数码组合后用常规加密解密算法的密钥重新加密。(3) The newly generated public management result data and the remaining public code and digital combination are re-encrypted with the key of the conventional encryption and decryption algorithm.

常规加密解密算法的密钥和公开密钥密码体制的加密解密算法涉及的两个密钥都得到了保护。这些密钥都是由网络管理站及其Java卡管理器自动生成和加载(存入Java卡证书或保存到Java卡),而不是人为分配的;另外,这些密钥只能由功能模块读取,被管理节点Java卡中保存的密钥只能由Java卡专用功能模块(解密器、加密和传输处理模块)访问。Both the key of the conventional encryption and decryption algorithm and the two keys involved in the encryption and decryption algorithm of the public key cryptosystem are protected. These keys are automatically generated and loaded by the network management station and its Java card manager (stored in the Java card certificate or saved to the Java card), rather than artificially assigned; in addition, these keys can only be read by the function module , the key stored in the Java card of the managed node can only be accessed by Java card-specific function modules (decryptor, encryption and transmission processing modules).

本发明方法还实现移动代理信息的数字签名机制。移动代理的公共代码和数据只能由网络管理站和各被管理节点的Java卡进行加密和解密,而私有代码和数据只能由所属的合法被管理节点或网络管理站进行加密和解密。在网管过程中,Java卡不受被管理节点控制,其输入是加密之后的移动代理,被管理节点不知道移动代理代码和数据加密的密钥而不能对移动代理进行加密,也就是说执行网管任务的移动代理只能最先由网络管理站发出。本发明方法主要利用这种移动代理的数字签名机制来让网络管理站和被管理节点核实移动代理的合法身份而防止伪造。The method of the invention also realizes the digital signature mechanism of the mobile agent information. The public code and data of the mobile agent can only be encrypted and decrypted by the network management station and the Java cards of each managed node, while the private code and data can only be encrypted and decrypted by the legal managed node or network management station to which it belongs. In the network management process, the Java card is not controlled by the managed node, and its input is the encrypted mobile agent. The managed node cannot encrypt the mobile agent because it does not know the mobile agent code and data encryption key, that is to say, execute the network management Mobile agents for tasks can only be first issued by the network management station. The method of the invention mainly utilizes the digital signature mechanism of the mobile agent to allow the network management station and the managed node to verify the legal identity of the mobile agent and prevent forgery.

3.有效性机制3. Validity Mechanism

本发明方法采用的一种有效性安全保护机制是在移动代理的公共数据中放入了一个时间戳,网络管理站和各被管理节点据此验证移动代理是否过期、确定移动代理是否可能被重发或篡改(因为重发和篡改都需要时间)。An effective security protection mechanism adopted by the method of the present invention is to put a time stamp in the public data of the mobile agent, and the network management station and each managed node will verify whether the mobile agent is expired or not, and determine whether the mobile agent may be reset. retransmission or tampering (because both retransmission and tampering take time).

本发明方法采用的另一种有效性安全保护机制是为每一个执行网管任务的移动代理和每一个私有代码分别分配一个唯一标识符,前一个标识符放入公共数据中,后一个标识符放入私有数据中。为移动代理及其私有代码分配唯一标识符将避免移动代理被重发或篡改。在被管理节点中,Java卡记录访问过的移动代理的唯一标识符和执行过的私有代码的唯一标识符,通过验证这两个标识符确定移动代理及其私有代码的合法性和有效性。Another effective security protection mechanism adopted by the method of the present invention is to assign a unique identifier to each mobile agent performing network management tasks and each private code, the former identifier is put into public data, and the latter identifier is put into public data. into private data. Assigning a unique identifier to the mobile agent and its private code will prevent the mobile agent from being resent or tampered with. In the managed node, the Java card records the unique identifier of the visited mobile agent and the unique identifier of the executed private code, and the legitimacy and validity of the mobile agent and its private code are determined by verifying these two identifiers.

本发明面向移动代理网管的安全保护方法所包含的步骤为:The steps included in the safety protection method for mobile agent network management of the present invention are:

步骤1).网络管理站的移动代理执行环境根据网管任务创建移动代理,根据所要遍历的被管理节点将该代理分割为公共代码和数据、各个被管理节点的私有代码和数据,提交给网络管理站的Java卡;Step 1). The mobile agent execution environment of the network management station creates a mobile agent according to the network management task, divides the agent into public code and data, private code and data of each managed node according to the managed nodes to be traversed, and submits them to the network management Station Java Card;

步骤2).网络管理站的Java卡首先对移动代理进行有效性管理,在移动代理公有数据中加上移动代理的唯一标识符、时间戳,在移动代理的各个私有数据中分别加上各个私有代码的唯一标识符,然后用常规加密算法加密移动代理的公共代码和数据,再分别用公开密钥密码体制的加密算法对各个节点的私有代码和数据进行加密,最后交给移动代理执行环境,传送给被管理节点;Step 2). The Java card of the network management station first carries out validity management to the mobile agent, adds the unique identifier and the time stamp of the mobile agent to the public data of the mobile agent, and adds each private data to the private data of the mobile agent respectively. The unique identifier of the code, and then encrypt the public code and data of the mobile agent with a conventional encryption algorithm, and then encrypt the private code and data of each node with the encryption algorithm of the public key cryptosystem, and finally hand it over to the mobile agent execution environment. sent to the managed node;

步骤3).移动代理到达被管理节点后,移动代理执行环境将其上载到该节点的Java卡中;Step 3). After the mobile agent arrives at the managed node, the mobile agent execution environment uploads it to the Java card of the node;

步骤4).被管理节点的Java卡首先用常规解密算法解密移动代理的公共代码和数据,然后用公开密钥密码体制的解密算法解密本地节点的私有代码和数据,最后从解密的信息中提取移动代理的唯一标识符、时间戳以及私有代码的唯一标识符,对移动代理进行有效性验证,检查移动代理和在本地节点中私有代码的唯一标识符验证其是否合法,通过检查时间戳验证其是否过期;Step 4). The Java card of the managed node first decrypts the public code and data of the mobile agent with a conventional decryption algorithm, then decrypts the private code and data of the local node with the decryption algorithm of the public key cryptosystem, and finally extracts the The unique identifier of the mobile agent, the timestamp and the unique identifier of the private code, verify the validity of the mobile agent, check the unique identifier of the mobile agent and the private code in the local node to verify whether it is legal, and verify its validity by checking the timestamp expired;

步骤5).被管理节点Java卡的功能提取模块从通过有效性验证的移动代理中,提取要在本节点执行的公共代码和数据以及私有代码和数据,交给Java卡任务执行器,任务执行器通过与移动代理执行环境的本地资源控制模块进行交互,完成网络管理任务;Step 5). The function extraction module of the Java card of the managed node extracts the public code and data and the private code and data to be executed at this node from the mobile agent through validity verification, and gives it to the Java card task executor, and the task is executed The server completes network management tasks by interacting with the local resource control module of the mobile agent execution environment;

步骤6).被管理节点的网管任务完成后,Java卡首先卸解掉移动代理中不再需要的私有代码和数据以及一些公有代码和数据,然后重新组合移动代理,对公有代码和数据用常规加密算法重新加密,而对新的私有数据用公开密钥密码体制的加密算法重新加密,最后,Java卡将重新组合后的移动代理和下一个节点的传输信息交给被管理节点的移动代理执行环境,移动代理执行环境将移动代理传送到下一个节点,移动代理在剩下的被管理节点继续进行网络管理;Step 6). After the network management task of the managed node is completed, the Java card first unloads the private code and data and some public code and data that are no longer needed in the mobile agent, then reassembles the mobile agent, and uses the conventional code and data for the public code and data. The encryption algorithm is re-encrypted, and the new private data is re-encrypted with the encryption algorithm of the public key cryptography system. Finally, the Java card sends the recombined mobile agent and the transmission information of the next node to the mobile agent of the managed node for execution environment, the mobile agent execution environment transmits the mobile agent to the next node, and the mobile agent continues network management in the remaining managed nodes;

步骤7).移动代理完成所有网管任务后,返回管理站,网络管理站的移动代理执行环境将其交给管理站的Java卡;Step 7). After the mobile agent completes all network management tasks, it returns to the management station, and the mobile agent execution environment of the network management station gives it to the Java card of the management station;

步骤8).网络管理站的Java卡首先用常规解密算法解密移动代理的公共数据,再用公开密钥密码体制的解密算法对所有节点的私有数据进行解密,然后对解密的移动代理进行有效性验证,通过检查移动代理的唯一标识符验证其是否合法,通过检查时间戳验证查其是否过期,最后,Java卡的信息提取模块从这些解密的数据中提取管理结果信息,提交给管理站移动代理执行环境做统计分析处理。Step 8). The Java card of the network management station first decrypts the public data of the mobile agent with a conventional decryption algorithm, and then decrypts the private data of all nodes with the decryption algorithm of the public key cryptosystem, and then performs a validity check on the decrypted mobile agent. Verification, verify whether it is legal by checking the unique identifier of the mobile agent, verify whether it is expired by checking the time stamp, and finally, the information extraction module of the Java card extracts the management result information from the decrypted data and submits it to the management station mobile agent The execution environment is used for statistical analysis and processing.

通过移动代理接收接口模块负责将移动代理输入网络管理站的移动代理执行环境到网络管理站的Java卡,通过管理信息处理模块处理网络管理站的Java卡所提交的管理结果信息,通过密码控制模块提供、更改或废除网络管理站的Java卡所用的密码,通过移动代理发送接口模块发送网络管理站的Java卡所提交的移动代理。The mobile agent receiving interface module is responsible for inputting the mobile agent into the mobile agent execution environment of the network management station to the Java card of the network management station, processing the management result information submitted by the Java card of the network management station through the management information processing module, and passing the password control module Provide, change or abolish the password used by the Java card of the network management station, and send the mobile agent submitted by the Java card of the network management station through the mobile agent sending interface module.

网络管理站的Java卡通过有效性管理模块为移动代理和每一个私有代码分别分配一个唯一标识符、在移动代理的公共数据中放入时间戳,或者检查移动代理中的唯一标识符保证信息没有重复、检查时间戳保证信息没有过期,通过加密和传输处理模块加密移动代理的代码和数据、设置代理的传输路径,通过解密器解密移动代理的代码和数据,通过信息提取模块提取移动代理的公共数据和私有数据。The Java card of the network management station assigns a unique identifier to the mobile agent and each private code through the validity management module, puts a time stamp in the public data of the mobile agent, or checks the unique identifier in the mobile agent to ensure that the information is not Repeat and check the timestamp to ensure that the information has not expired, encrypt the code and data of the mobile agent through the encryption and transmission processing module, set the transmission path of the agent, decrypt the code and data of the mobile agent through the decryptor, and extract the public information of the mobile agent through the information extraction module data and private data.

被管理节点的移动代理执行环境通过移动代理接收接口模块负责将移动代理输入到被管理节点的Java卡,通过本地资源控制模块保证Java卡合法访问被管理节点系统资源、读写被管理对象,通过移动代理发送接口模块发送被管理节点的Java卡所提交的移动代理。The mobile agent execution environment of the managed node is responsible for inputting the mobile agent to the Java card of the managed node through the mobile agent receiving interface module, and ensuring that the Java card legally accesses the system resources of the managed node and reads and writes managed objects through the local resource control module. The mobile agent sending interface module sends the mobile agent submitted by the Java card of the managed node.

被管理节点的Java卡通过解密器解密移动代理的代码和数据,通过有效性验证模块检查移动代理的唯一标识符保证信息没有重复、检查时间戳保证信息没有过期,通过功能提取模块从验证通过的移动代理中,提取在本节点执行的代码和数据,通过任务执行器与所述被管理节点的移动代理执行环境中的本地资源控制模块交互执行网管任务,通过加密和传输处理模块加密移动代理的代码和数据、设置代理的传输路径。The Java card of the managed node decrypts the code and data of the mobile agent through the decryptor, checks the unique identifier of the mobile agent through the validity verification module to ensure that the information is not repeated, checks the time stamp to ensure that the information is not expired, and passes the verification through the function extraction module. In the mobile agent, the code and data executed on the node are extracted, and the network management task is executed through the interaction between the task executor and the local resource control module in the mobile agent execution environment of the managed node, and the encrypted data of the mobile agent is encrypted by the encryption and transmission processing module. Code and data, set the transmission path of the agent.

有益效果Beneficial effect

本发明方法提出了综合的移动代理网管安全保护方法。通过使用本发明提出的方法可以避免分散的安全保护方法累积时带来的复杂性、可以提高安全方法的灵活性,有效的达到保护移动代理网管的目的。下面给出具体的说明。The method of the invention proposes a comprehensive mobile agent network management safety protection method. By using the method proposed by the invention, the complexity caused by the accumulation of scattered security protection methods can be avoided, the flexibility of the security method can be improved, and the purpose of protecting the mobile agent network management can be effectively achieved. A specific description is given below.

1.硬件和软件相结合的安全保护1. Security protection combined with hardware and software

在本发明方法中,移动代理执行环境和Java卡这种可靠性很强的硬件相结合,有助于使移动代理在网管中免受潜在的恶意节点的攻击。在具体的网管过程中,移动代理通过消息与不可信赖环境交互完成网管任务,当硬件不能控制节点时,节点的资源得到了保护。在此基础上,密码技术的使用将进一步在软件层次上保证移动代理以及网管信息的安全性。本发明方法从硬件和软件综合的角度保证了移动代理网管的安全性,降低了安全保护的难度,增加了安全的可配置性,系统易于扩展。In the method of the invention, the mobile agent execution environment is combined with the highly reliable hardware such as the Java card, which helps the mobile agent to avoid the attack of potential malicious nodes in the network management. In the specific network management process, the mobile agent completes the network management task by interacting with the untrustworthy environment through messages. When the hardware cannot control the node, the resource of the node is protected. On this basis, the use of cryptographic technology will further ensure the security of mobile agent and network management information at the software level. The method of the invention ensures the safety of the mobile agent network management from the perspective of hardware and software integration, reduces the difficulty of safety protection, increases the configurability of safety, and makes the system easy to expand.

2.灵活性2. Flexibility

在本发明方法中,移动代理根据具体的网管任务来灵活地实施安全保护,在这个过程中,将移动代理区分为公共代码和数据以及私有代码和数据有助于有差别地实施对不同对象的安全保护,从而在保护强度上提高了系统的灵活性。In the method of the present invention, the mobile agent flexibly implements security protection according to specific network management tasks. In this process, distinguishing the mobile agent into public codes and data and private codes and data helps to implement security protection for different objects differently. Security protection, thus improving the flexibility of the system in terms of protection strength.

3.有效保护网管传输中移动代理的安全3. Effectively protect the security of mobile agents in network management transmission

攻击者截获被管理网络传输中的移动代理,他就有可能篡改、伪造和重发该移动代理。在本发明方法中,攻击者面临的困难是,他必须获取常规加密解密算法的密钥或者公开密钥密码体制的加密解密算法的加密密钥和解密密钥,才能够篡改和伪造该移动代理。而这些密钥都是由网络管理站及其Java卡管理器自动生成和加载(存入Java卡证书或保存到Java卡),对任何人(包括管理员)都是保密的;同时,各个被管到节点的Java卡都不受本地节点的控制,所以攻击者获取这些密钥一般来说是不可能的。攻击者截获传输中的移动代理后,对If the attacker intercepts the mobile agent in the managed network transmission, he may tamper with, forge and resend the mobile agent. In the method of the present invention, the difficulty faced by the assailant is that he must obtain the encryption key and the decryption key of the encryption and decryption algorithm of the encryption and decryption algorithm of the conventional encryption and decryption algorithm or the public key cryptosystem, so as to be able to tamper with and forge the mobile agent . These keys are all automatically generated and loaded by the network management station and its Java Card manager (stored in the Java Card certificate or stored in the Java Card), and are kept confidential to anyone (including the administrator); None of the Java Cards piped to the node is controlled by the local node, so it is generally impossible for an attacker to obtain these keys. After the attacker intercepts the mobile agent in transmission, the

网络管理的另一个攻击就是重发。但在本发明方法中,通过Java卡的有效性验证(管理站Java卡的有效性管理),检查移动代理的唯一标识符、时间戳以及移动代理中在被管理节中私有代码的唯一标识符,能够验证该代理是否访问过当前节点,该代理中被管理节点私有代码是否曾经执行过,该代理是否过期。可见,本发明方法能够在一定程度上抵御传输中移动代理被篡改和伪造,也能够有效地抵御重发攻击。Another attack on network management is retransmission. But in the inventive method, by the validity verification of Java card (the validity management of management station Java card), check the unique identifier of mobile agent, time stamp and the unique identifier of private code in the managed section in mobile agent , can verify whether the agent has visited the current node, whether the private code of the managed node in the agent has ever been executed, and whether the agent has expired. It can be seen that the method of the present invention can resist tampering and forgery of the mobile agent during transmission to a certain extent, and can also effectively resist retransmission attacks.

4.最大限度减少安全隐患4. Minimize potential safety hazards

攻击者获取了公开密钥密码体制的加密解密算法的加密密钥和(或)解密密钥。在本发明方法中,因为公开密钥密码体制的加密解密算法用来加密或解密移动代理的各个被管理节点的私有代码和数据,所以当攻击者只获得某个被管理节点公开密钥密码体制的加密解密算法的解密密钥时,他可以解密移动代理中属于该节点的私有代码或数据,但当他没有获得加密密钥时,就不能篡改和伪造私有代码或数据,因为Java卡输入的必须是加密后的私有代码和数据,而攻击者不知道加密密钥就无法对篡改和伪造后的私有代码或数据进行加密,所以攻击者对私有代码或数据的篡改和伪造对于Java卡执行管理任务来说是无效的。因此,当攻击者同时知道加密密钥和解密密钥时,他就可以在MAEE将移动代理输入Java卡之前,解密属于该节点的私有代码或数据,然后进行篡改和伪造,重新加密后,放回移动代理,输入到Java卡中,从而欺骗了本地节点的Java卡执行非法的网络管理任务;另外,攻击者在移动代理完成任务输入到MAEE后,可以解密本节点的私有数据,进行篡改和伪造,然后重新加密后,放回移动代理,从而欺骗网络管理站。但是公开密钥密码体制的加密解密算法的加密密钥和解密密钥的泄密只影响局部节点的安全网络管理,而不影响其它部分安全的网络管理。可见,本发明方法对各个被管理节点私有代码和数据的分开加密保护,能够将网络管理过程的安全隐患限制在局部节点而减少了安全威胁的影响在整个被管理网络的扩散。The attacker obtained the encryption key and (or) decryption key of the encryption and decryption algorithm of the public key cryptosystem. In the method of the present invention, because the encryption and decryption algorithm of the public key cryptosystem is used to encrypt or decrypt the private codes and data of each managed node of the mobile agent, so when the attacker only obtains a certain managed node public key cryptosystem When the decryption key of the encryption and decryption algorithm is obtained, he can decrypt the private code or data belonging to the node in the mobile agent, but when he does not obtain the encryption key, he cannot tamper with and forge the private code or data, because the Java card input It must be encrypted private code and data, and the attacker cannot encrypt the tampered and forged private code or data without knowing the encryption key, so the tampering and forgery of the private code or data by the attacker is for the Java card to perform management Invalid for the task. Therefore, when the attacker knows the encryption key and the decryption key at the same time, he can decrypt the private code or data belonging to the node before MAEE enters the mobile agent into the Java card, and then tamper and forge it. After re-encrypting, put return to the mobile agent and input it into the Java card, thereby deceiving the Java card of the local node to perform illegal network management tasks; in addition, after the mobile agent completes the task and inputs it to the MAEE, the attacker can decrypt the private data of the node to tamper with and Forged, then re-encrypted, put back into the mobile agent, thereby deceiving the network management station. However, the disclosure of the encryption key and decryption key of the encryption and decryption algorithm of the public key cryptosystem only affects the secure network management of local nodes, and does not affect the secure network management of other parts. It can be seen that the method of the present invention separately encrypts and protects the private code and data of each managed node, which can limit the safety hazards of the network management process to local nodes and reduce the spread of the influence of safety threats in the entire managed network.

附图说明Description of drawings

图1是移动代理网管安全体系结构示意图。Figure 1 is a schematic diagram of the mobile agent network management security architecture.

图2是Java卡和移动代理执行环境的结构及其交互示意图,其中图2a为网络管理站部分,图2b为被管理节点部分。Figure 2 is a schematic diagram of the structure and interaction of Java Card and mobile agent execution environment, where Figure 2a is the part of the network management station, and Figure 2b is the part of the managed node.

图3是面向移动代理网管的安全方法流程示意图。Fig. 3 is a flow diagram of a security method for mobile agent network management.

具体实施方式Detailed ways

下面根据附图和实施例对本发明作更详细的描述。The present invention will be described in more detail according to the drawings and embodiments below.

根据图1和图2,本发明是一种系统的面向移动代理网管的安全保护方法,从移动代理在网络管理站中创建、到在被管理节点中执行网管任务,最后回到网络管理站提交信息,整个网络管理过程都受到安全的保护。According to Fig. 1 and Fig. 2, the present invention is a security protection method oriented to mobile agent network management of a kind of system, from the creation of mobile agent in the network management station, to the execution of network management tasks in the managed node, and finally returning to the network management station to submit Information, the entire network management process is protected by security.

为了方便描述,我们假定执行网管任务的移动代理要访问n个被管理节点,每一个被管理节点的Java卡保存有常规加密解密算法的密钥和公开密钥密码体制的加密解密算法涉及的两个密钥,设常规加密解密算法的密钥为K,第i(1≤i≤n)被管理节点的Java卡保存的公开密钥密码体制的加密解密算法的加密密钥为PKi,解密密钥为SKi;网络管理站的Java卡从移动代理执行环境可以获得K、PK1~PKn、SK1~SKn。在管理过程中,网络管理站的移动执行环境创建移动代理(装配有公共代码和数据,所访问的各个被管理节点的私有代码和数据),管理站和各个被管理节点的移动代理执行环境负责移动代理的传送和接收。具体实施方式(图3)为:For the convenience of description, we assume that the mobile agent performing network management tasks needs to visit n managed nodes, and the Java card of each managed node stores the key of the conventional encryption and decryption algorithm and the two involved in the encryption and decryption algorithm of the public key cryptosystem. A key, let the key of the conventional encryption and decryption algorithm be K, the encryption key of the encryption and decryption algorithm of the public key cryptosystem saved by the Java card of the i (1≤i≤n) managed node is PK i , and the decryption The key is SK i ; the Java card of the network management station can obtain K, PK 1 ~PK n , SK 1 ~SK n from the mobile agent execution environment. In the management process, the mobile execution environment of the network management station creates mobile agents (equipped with public codes and data, private codes and data of each managed node being accessed), and the management station and the mobile agent execution environment of each managed node are responsible for Transmission and reception of mobile agents. The specific implementation method (Fig. 3) is:

(1)网络管理站的MAEE根据网管任务创建移动代理,根据所要遍历的被管理节点将该代理分割为公共代码和数据、各个被管理节点的私有代码和数据,提交给网络管理站的Java卡(1) The MAEE of the network management station creates a mobile agent according to the network management task, divides the agent into public codes and data, private codes and data of each managed node according to the managed nodes to be traversed, and submits them to the Java card of the network management station

(2)网络管理站的Java卡首先对移动代理进行有效性管理,在移动代理公有数据中加上移动代理的唯一标识符、时间戳,在移动代理的各个私有数据中分别加上各个私有代码的唯一标识符;然后用常规加密算法加密移动代理公共代码和数据,再分别用公开密钥密码体制的加密算法对各个节点的私有代码和数据进行加密,最后交给MAEE,传送给第一个被管理节点。(2) The Java card of the network management station firstly manages the validity of the mobile agent, adds the unique identifier and time stamp of the mobile agent to the public data of the mobile agent, and adds each private code to each private data of the mobile agent The unique identifier of the mobile agent; then use the conventional encryption algorithm to encrypt the public code and data of the mobile agent, and then use the encryption algorithm of the public key cryptosystem to encrypt the private code and data of each node, and finally hand it over to MAEE and send it to the first managed node.

(3)移动代理到达第i(1≤i≤n)被管理节点后,MAEE将其上载到该节点的Java卡中。(3) After the mobile agent reaches the i-th (1≤i≤n) managed node, MAEE uploads it to the Java card of the node.

第i被管理节点的Java卡用常规解密算法解密移动代理的公共代码和数据,再用公开密钥密码体制的解密算法对本节点的私有代码和数据进行解密,从解密的信息中提取移动代理的唯一标识符、时间戳以及在本地节点中私有代码的唯一标识符,对移动代理进行有效性验证,检查移动代理和在本地节。The Java card of the i-th managed node decrypts the public code and data of the mobile agent with a conventional decryption algorithm, and then uses the decryption algorithm of the public key cryptosystem to decrypt the private code and data of the node, and extracts the mobile agent’s ID from the decrypted information. Unique identifier, time stamp and unique identifier of the private code in the local node, validating the mobile agent, checking the mobile agent and the local node.

(4)点中私有代码的唯一标识符验证其是否合法,通过检查时间戳验证其是否过期。(4) The unique identifier of the private code in the point verifies whether it is legal, and verifies whether it is expired by checking the timestamp.

(5)第i被管理节点Java卡的功能提取模块从通过有效性验证的移动代理中,提取要在本节点执行的公共代码和数据以及私有代码和数据,交给Java卡任务执行器。任务执行器通过与第i被管理节点MAEE的本地资源控制模块(5) The function extraction module of the i-th managed node Java card extracts the public codes and data and private codes and data to be executed on this node from the mobile agent that has passed the validity verification, and delivers them to the Java card task executor. The task executor communicates with the local resource control module of the i-th managed node MAEE

(6)进行交互,完成网管任务。(6) Interact and complete network management tasks.

(7)第i被管理节点的网管任务完成后,Java卡卸解掉移动代理中不再需要的私有代码和数据以及一些公有代码和数据,重新组合移动代理,对公有代码和数据(可能包含新的数据)用常规加密算法重新加密,而对新的私有数据(可能不存在)用公开密钥密码体制的加密算法重新加密。最后,Java卡将重新组合后的移动代理和下一个节点的传输信息提交给第i被管理节点的MAEE。第i被管理节点的MAEE将移动代理传送到下一个节点。若下一个节点是被管理节点,转到(2);若下一个节点是网络管理站,则继续往下。(7) After the network management task of the i-th managed node is completed, the Java card unloads the private code and data and some public codes and data that are no longer needed in the mobile agent, and reassembles the mobile agent. New data) is re-encrypted with a conventional encryption algorithm, and new private data (which may not exist) is re-encrypted with an encryption algorithm of a public key cryptosystem. Finally, the Java card submits the recombined mobile agent and the transmission information of the next node to the MAEE of the i-th managed node. The MAEE of the ith managed node transfers the mobile agent to the next node. If the next node is the managed node, go to (2); if the next node is the network management station, continue down.

(8)移动代理到达网络管理站后,MAEE将其上载到网络管理站的Java卡中。(8) After the mobile agent arrives at the network management station, MAEE uploads it to the Java card of the network management station.

(9)网络管理站的Java卡用常规解密算法解密移动代理的公共数据,再用公开密钥密码体制的解密算法对所有节点的私有数据进行解密,然后对解密的移动代理进行有效性验证,通过检查移动代理的唯一标识符验证其是否合法,通过检查时间戳验证查其是否过期。通过验证后,Java卡的信息提取模块从这些解密的数据中提取管理结果信息,交给管理站MAEE的管理信息处理模块做统计分析处理。(9) The Java card of the network management station decrypts the public data of the mobile agent with a conventional decryption algorithm, and then decrypts the private data of all nodes with the decryption algorithm of the public key cryptosystem, and then verifies the validity of the decrypted mobile agent, Verify that the mobile agent is legitimate by checking its unique identifier, and verify that it is not expired by checking its timestamp. After passing the verification, the information extraction module of the Java card extracts the management result information from the decrypted data, and sends it to the management information processing module of the management station MAEE for statistical analysis and processing.

Claims (5)

1, a kind of method for security protection towards mobile agent network management is characterized in that the step that this method comprises is:
Step 1). the mobile agent execution environment of Network Management Station is according to webmaster task creation mobile agent, according to travel through by management node with this agency be divided into common code and data, each is by the privately owned code and the data of management node, submits to the Java card of Network Management Station;
Step 2). the Java card of Network Management Station at first carries out the validity management to mobile agent, in the publicly-owned data of mobile agent, add unique identifier, the timestamp of mobile agent, in each private data of mobile agent, add the unique identifier of each privately owned code respectively, encrypt the common code and the data of mobile agent then with conventional cryptographic algorithm, with the cryptographic algorithm of public-key encryptosystem the privately owned code and the data of each node are encrypted respectively again, give the mobile agent execution environment at last, send to by management node;
Step 3). mobile agent arrives by behind the management node, and the mobile agent execution environment uploads to it in Java card of this node;
Step 4). at first deciphered the common code and the data of mobile agent with conventional decipherment algorithm by the Java card of management node, decipher the privately owned code and the data of local node then with the decipherment algorithm of public-key encryptosystem, from the information of deciphering, extract the unique identifier of unique identifier, timestamp and the privately owned code of mobile agent at last, mobile agent is carried out validation verification, check mobile agent and in local node the unique identifier of privately owned code verify whether it legal, whether it expired to stab checking by the review time;
Step 5). by the function extraction module of management node Java card from by the mobile agent of validation verification, extraction will be in common code and data and the privately owned code and the data of this node execution, give Java card task actuator, the task actuator is by carrying out finishing network management task alternately with the local resource control module of mobile agent execution environment;
Step 6). after being finished by the webmaster task of management node, Java card at first unloads takes off privately owned code and data and some publicly-owned code and the data that no longer need in the mobile agent, reconfigure mobile agent then, publicly-owned code and data are encrypted again with conventional cryptographic algorithm, and new private data is encrypted again with the cryptographic algorithm of public-key encryptosystem, at last, the mobile agent after Java card will reconfigure and the transmission information of next node are given by the mobile agent execution environment of management node, the mobile agent execution environment is sent to next node with mobile agent, and mobile agent is proceeded network management remaining by management node;
Step 7). mobile agent returns management station after finishing all webmaster tasks, and the mobile agent execution environment of Network Management Station is given the Java card of management station with it;
Step 8). the Java card of Network Management Station is at first deciphered the common data of mobile agent with conventional decipherment algorithm, be decrypted with the decipherment algorithm of public-key encryptosystem private data again all nodes, mobile agent to deciphering carries out validation verification then, verify by the unique identifier of checking mobile agent whether it is legal, stab checking by the review time and look into whether it expired, at last, the information extraction modules of Java card is the extract management object information from these decrypted data, submits to management station's mobile agent execution environment and does the statistical analysis processing.
2, the method for security protection towards mobile agent network management as claimed in claim 1; it is characterized in that being responsible for the mobile agent execution environment of mobile agent fan-in network management station Java card to Network Management Station by mobile agent receiving interface module; handle the management object information that the Java card of resume module Network Management Station is submitted to by management information; provide, change or abolish the used password of Java card of Network Management Station by the cipher control module, send the mobile agent that the Java card of Network Management Station is submitted to by mobile agent transmission interface module.
3; method for security protection towards mobile agent network management as claimed in claim 2; the Java card that it is characterized in that Network Management Station is that mobile agent and each privately owned code distribute a unique identifier respectively by the validity administration module; in the common data of mobile agent, put into timestamp; check that perhaps the unique identifier guarantee information in the mobile agent does not repeat; review time is stabbed guarantee information not to be had expired; code and data by encryption and transmission process module encrypt mobile agent; agency's transmission path is set; by the code and the data of decipher deciphering mobile agent, extract the common data and the private data of mobile agent by information extraction modules.
4, the method for security protection towards mobile agent network management as claimed in claim 1; it is characterized in that being responsible for mobile agent is input to by the Java card of management node by mobile agent receiving interface module by the mobile agent execution environment of management node; guarantee that by the local resource control module Java card Lawful access by management node system resource, read-write managed object, sends the mobile agent of being submitted to by the Java card of management node by mobile agent transmission interface module.
5; method for security protection towards mobile agent network management as claimed in claim 4; it is characterized in that by code and the data of the Java card of management node by decipher deciphering mobile agent; unique identifier guarantee information by validation verification module check mobile agent does not repeat; review time is stabbed guarantee information not to be had expired; by the function extraction module from the mobile agent that checking is passed through; be extracted in code and data that this node is carried out; by the task actuator and describedly carried out the webmaster task alternately, by encrypting and the code and the data of transmission process module encrypt mobile agent by the local resource control module in the mobile agent execution environment of management node; agency's transmission path is set.
CNB2005100940323A 2005-08-26 2005-08-26 Safety protection method facing to mobile agent network management Expired - Fee Related CN100369421C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100940323A CN100369421C (en) 2005-08-26 2005-08-26 Safety protection method facing to mobile agent network management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100940323A CN100369421C (en) 2005-08-26 2005-08-26 Safety protection method facing to mobile agent network management

Publications (2)

Publication Number Publication Date
CN1744523A true CN1744523A (en) 2006-03-08
CN100369421C CN100369421C (en) 2008-02-13

Family

ID=36139731

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100940323A Expired - Fee Related CN100369421C (en) 2005-08-26 2005-08-26 Safety protection method facing to mobile agent network management

Country Status (1)

Country Link
CN (1) CN100369421C (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100411361C (en) * 2006-03-21 2008-08-13 南京邮电大学 A Security Architecture Method for Protecting Mobile Agent Network Management Application
CN1822595B (en) * 2006-03-23 2010-04-14 南京邮电大学 An Event Response Model Method Based on Mobile Agent Production Development
CN101394418B (en) * 2008-10-22 2011-09-07 南京邮电大学 General computation data processing control method based on mobile proxy
US8230220B2 (en) 2007-09-14 2012-07-24 China Iwncomm Co., Ltd. Method for realizing trusted network management
CN103905466A (en) * 2014-04-22 2014-07-02 郭伟 Data access control system and method for storage system
CN101416469B (en) * 2006-04-28 2014-07-09 高通股份有限公司 Uninterrupted transmission during a change in ciphering configuration
CN104012122A (en) * 2011-12-23 2014-08-27 德国捷德有限公司 Method for communicating with an application on a portable data storage medium, and such a portable data storage medium
CN104205117A (en) * 2014-04-10 2014-12-10 华为技术有限公司 Device file encryption and decryption method and device
CN119397566A (en) * 2024-10-22 2025-02-07 华电陕西能源有限公司 Data governance methods, devices, equipment, storage media and products

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000207326A (en) * 1999-01-08 2000-07-28 Matsushita Electric Ind Co Ltd Mobile agent method
US6681243B1 (en) * 1999-07-27 2004-01-20 Intel Corporation Network environment supporting mobile agents with permissioned access to resources

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100411361C (en) * 2006-03-21 2008-08-13 南京邮电大学 A Security Architecture Method for Protecting Mobile Agent Network Management Application
CN1822595B (en) * 2006-03-23 2010-04-14 南京邮电大学 An Event Response Model Method Based on Mobile Agent Production Development
CN101416469B (en) * 2006-04-28 2014-07-09 高通股份有限公司 Uninterrupted transmission during a change in ciphering configuration
US8230220B2 (en) 2007-09-14 2012-07-24 China Iwncomm Co., Ltd. Method for realizing trusted network management
CN101394418B (en) * 2008-10-22 2011-09-07 南京邮电大学 General computation data processing control method based on mobile proxy
CN104012122A (en) * 2011-12-23 2014-08-27 德国捷德有限公司 Method for communicating with an application on a portable data storage medium, and such a portable data storage medium
CN104012122B (en) * 2011-12-23 2018-07-17 捷德移动安全有限责任公司 For with the interapplication communications on portable data medium method and such portable data medium
CN104205117A (en) * 2014-04-10 2014-12-10 华为技术有限公司 Device file encryption and decryption method and device
WO2015154285A1 (en) * 2014-04-10 2015-10-15 华为技术有限公司 Device file encryption and decryption method and device
CN104205117B (en) * 2014-04-10 2017-04-26 华为技术有限公司 device file encryption and decryption method and device
CN103905466A (en) * 2014-04-22 2014-07-02 郭伟 Data access control system and method for storage system
CN103905466B (en) * 2014-04-22 2017-01-11 郭伟 Data access control system and method for storage system
CN119397566A (en) * 2024-10-22 2025-02-07 华电陕西能源有限公司 Data governance methods, devices, equipment, storage media and products
CN119397566B (en) * 2024-10-22 2025-04-18 华电陕西能源有限公司 Data governance methods, devices, equipment, storage media and products

Also Published As

Publication number Publication date
CN100369421C (en) 2008-02-13

Similar Documents

Publication Publication Date Title
JP4689946B2 (en) A system that executes information processing using secure data
JP4689945B2 (en) Resource access method
England et al. A trusted open platform
CN104769606B (en) Systems and methods for providing a secure computer environment
EP2907071B1 (en) Secure data handling by a virtual machine
EP1761837B1 (en) System and method for secure inter-platform and intra-platform communications
US8953805B2 (en) Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method
CN101039186A (en) Method for auditing safely system log
CN105260663A (en) Secure storage service system and method based on TrustZone technology
CN1605054A (en) Connect virtual tokens to physical tokens
CN100547598C (en) Saving and retrieving data based on symmetric key encryption
England et al. Authenticated operation of open computing devices
CN1791111A (en) Method and apparatus for security over multiple interfaces
Bagga et al. Mobile agents system security: A systematic survey
US20060005015A1 (en) System and method for secure inter-platform and intra-platform communications
Mayrhofer An architecture for secure mobile devices
CN1744523A (en) A security protection method for mobile agent network management
Focardi et al. A formally verified configuration for hardware security modules in the cloud
CN114826702B (en) Database access password encryption method, device and computer equipment
McGregor et al. Protecting cryptographic keys and computations via virtual secure coprocessing
CN120915488A (en) Safe sandbox system for trusted data space
Shang et al. CCxTrust: Confidential computing platform based on TEE and TPM collaborative trust
CN106790100B (en) Data storage and access control method based on asymmetric cryptographic algorithm
CN1992714A (en) Authority principal method based on trusted computing platform
CN100411361C (en) A Security Architecture Method for Protecting Mobile Agent Network Management Application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20060308

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000219

Denomination of invention: Safety protection method facing to mobile agent network management

Granted publication date: 20080213

License type: Common License

Record date: 20161121

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000219

Date of cancellation: 20180116

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080213

Termination date: 20170826