International Journal of Power Control Signal and Computation(IJPCSC) Vol3. No1. Jan-Mar 2012 ISSN: 0976-268X www.ijcns.com 1 Enhanced Security through Agent Based Non-Repudiation Protocol for Mobile Agents CeronmaniSharmila V #1 , KomalaValli V #2 #1 Assistant Professor (PhD), Department of IT, Hindustan University P.O.Box No 1, Rajiv Gandhi Salai, Padur, India, 603 103 1 csharmila@hindustanuniv.ac.in 2 komalavadivelu@gmail.com Abstract-In mobile communication, the key factor that affects the performance of a good security protocol is the timeliness of the security components of the transactions. Even though, there are mathematically well-established rigid security algorithms and implementation mechanisms available in the market, it is very difficult to predict the events in a mobile communication mechanism. This timeliness of the information exchange between two mobile nodes involved in any mobile wireless communication has led to various attempts to innovate good rigid security mechanisms that shall also take care of the time domain factors. Non repudiation protocols are designed in such a way that two agents were involved in transactions shall never be able to repudiate and deny the involvement at a later point of time. In this work, a non-repudiation agent based approach for resolving any conflicts in security protocols is being proposed. An evidence of a transaction is generated by wireless PKI mechanism such that User and Rights Issuer cannot repudiate sending and receiving the message respectively. User generates a mobile agent, which carries encrypted payment information to RI. The user also issues this mobile agent a proxy certificate; this certificate guarantees the binding relationship between them. One trusted third party acts as a lightweight notary for evidence generation. Keywords -Mobile agent, Non-repudiation, WPKI, Digital rights management, Proxy certificate, Broker 1.INTRODUCTION When a user sends some message to a rights issuer, neither User nor Right Issuer can deny having participated in this transaction. An evidence of a transaction is generated by wireless PKI mechanism such that User and Right Issuer cannot repudiate sending and receiving the message respectively. User generates a mobile agent which carries encrypted payment information to Right Issuer. This mobile agent is also issued a proxy certificate by User; this certificate guarantees the binding relationship between them. So here one trusted third party acts as a lightweight notary for evidence generation. And advantage of this agent- based non-repudiation protocol is to reduce inconvenience for mobile clients such as connection time; it causes difficulty for fair transaction for mobile Digital Rights Management. These were ensured by Non-repudiation of a mobile digital rights management. Wireless device which communicates with application servers over the air are highly exposed to potential security threats. They enhanced security and authenticity services for mobile transactions which are not properly supported by the original GSM and UMTS security mechanism. For example Stach, Park, and Makkai. More over the application increases, further sensitive services such as payment and billing are needed. This scheme can provide non-repudiation billing services based on digital signatures. The main purpose of non-repudiation is to collect, maintain, make available and validate irrefutable evidence concerning a claimed event or action. Any evidence has to be verified by some fair arbitrator once dispute arises. We propose an agent-based architecture and protocol to implement the non-repudiation mechanism over the mobile application systems, which includes the digital right management (DRM); this will also improve the security mechanismsof those existing electronic invoice systems. On the other hand, mobile applications need to be user friendly and convenient for mobile client through their mobile handset; this investigation leads to research for agent-based mobile applications. Digital rights management (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. Many multimedia contents are distributed without any copyright protection via digitalization and communication network. The term is used to describe any technology that inhibits uses of digital content that is not desired or intended by the content provider. The term does not generally refer to other forms of copy protection, which can be circumvented without modifying the file or device, such as serial numbers or key files. It can also refer to restrictions associated with specific instances of digital works or devices. In this paper, we show how to establish a simpleagent-based protocol integrated existing DRM architecture basedon the OMA (open mobile alliance) DRM specification. This protocolprovides the secure mechanism between the mobile user andthe right issuer through the mobile network provider, while they are exchanging a Right Object according to agreed purchase order. Non-repudiation services must ensure that when