Skip to main content

Towards a Security Solution for Mobile Agents

  • Conference paper
Advances in Information Systems and Technologies

Abstract

The current distributed systems are mainly based on the client – server model. The growing use of the Internet and the development of information and communication technologies has yielded more needs in terms of performance, reliability and security of information. By its synchronous nature, the client – server model no longer seems able to meet these new demands. Several new approaches have been proposed, for example the mobility of the code, involving the emergence of the mobile agents’ paradigm (MA). This paradigm certainly holds great promise, though questions of security arise. In this paper, we propose an extension of the MA model called Seller – Buyer model (SB). This extension is made by making the server component mobile and using market mechanisms between the client agent (the buyer) and the server agent (the seller). While most of works in the area propose asymmetric security solutions, the SB model proposes a symmetric security approach for the MA. The SB model will give the developers a way to use, safely and efficiently, MA to build distributed applications on large-scale networks such as the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arbaugh, B., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. Paper presented at the IEEE Symposium on Security and Privacy (1997)

    Google Scholar 

  2. ASDK. IBM Aglets Software Development Kit Homepage, http://www.trl.ibm.co.jp/aglets (accessed in July 2010)

  3. Chan, A.H.W., Wong, C.K.M., Wong, T.Y., Lyu, M.R.: Securing Mobile Agents for Electronic Commerce: an Experiment. In: Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures. Kluwer, B.V. Deventer (2000)

    Google Scholar 

  4. Baumann, J., Hohl, F., Rothernel, K., Straβer, M., Theilmann, W.: Mole: A mobile agent system. Journal of Software-Practice and Experience (SPE) 32(6), 575–603 (2002)

    Article  MATH  Google Scholar 

  5. FIPA, Official site of the Foundation for Intelligent Physical Agents (2009), Obtained through the Internet: http://www.fipa.org (accessed June 15, 2009)

  6. Garrigues, C., Robles, S., Borrell, J.: Securing dynamic itineraries for mobile agent applications. Journal of Network & Computer Applications 31(4), 487–508 (2008)

    Article  Google Scholar 

  7. Garrigues, C., Midas, N., Buchanan, W., Robles, S., Borrell, J.: Protecting mobile agents from external replay attacks. Journal of System Software 82(2), 197–206 (2009)

    Article  Google Scholar 

  8. Gulyás, L., Kovács, L., Micsik, A., Pataki, B., Zsámboki, I.: An Overview of Mobile Software Systems. MTA SZTAKI Technical Report. Department of Distributed Systems, MTA SZTAKI, Computer and Automation Research Institute of the Hungarian Academy of Sciences (2001)

    Google Scholar 

  9. Harrison, C.G., Chess, D.M., Kershenbaum, A.: Mobile Agents: Are they a good idea? IBM T.J. Watson Research Report. RC 19887 (1995)

    Google Scholar 

  10. Jansen, W., Mell, P., Marks, D., Karygiannis, T.: Mobile agent security. National Institute of Standards and Technology (NIST) Special Publication – 800-19, Gaithersburg, MD 20899, USA (October 1999)

    Google Scholar 

  11. Lange, D.B., Oshima, M.: Seven Good Reasons for Mobile Agents. Communications of the ACM 42(3), 88–89 (1999)

    Article  Google Scholar 

  12. Menacer, D.E., Drias, H., Sibertin-Blanc, C.: The MP Architecture: towards a secure framework for mobile agents. International Journal of Agent-Oriented Software Engineering 4(4), 390–414 (2011)

    Article  Google Scholar 

  13. Milojicic, D., Breugst, M., Busse, I., Campbell, J., Covaci, S., Friedman, B., Kosaka, K., Lange, D., Ono, K., Oshima, M., Tham, C., Virdhagriswaran, S., White, J.: MASIF: The OMG Mobile Agent System Interoperability Facility. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 50–67. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Papaioannou, T.: Mobile Agents: Are They Useful for Establishing a Virtual Presence in Space? In: Agents with Adjustable Autonomy Symposium, Part of the AAAI 1999. Spring Symposium Series (1999)

    Google Scholar 

  15. Ugurlu, S., Erdoğan, N.: SECMAP: A Secure Mobile Agent Platform. In: Pěchouček, M., Petta, P., Varga, L.Z. (eds.) CEEMAS 2005. LNCS (LNAI), vol. 3690, pp. 102–111. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  16. Rouvrais, S.: Construction de services distribués: une approche à base d’agents mobiles. TSI-HERMES / RSTI – TSI 21(7), 985–1007 (2002)

    Google Scholar 

  17. Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 40–60. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  18. Tschudin, C.: Mobile Agent Security. In: Intelligent Information Agent: Agent Based Information Discovery and Management in the Internet, pp. 431–446 (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Djamel Eddine Menacer .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Menacer, D.E., Drias, H., Sibertin-Blanc, C. (2013). Towards a Security Solution for Mobile Agents. In: Rocha, Á., Correia, A., Wilson, T., Stroetmann, K. (eds) Advances in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36981-0_91

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36981-0_91

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36980-3

  • Online ISBN: 978-3-642-36981-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics