Abstract
The current distributed systems are mainly based on the client – server model. The growing use of the Internet and the development of information and communication technologies has yielded more needs in terms of performance, reliability and security of information. By its synchronous nature, the client – server model no longer seems able to meet these new demands. Several new approaches have been proposed, for example the mobility of the code, involving the emergence of the mobile agents’ paradigm (MA). This paradigm certainly holds great promise, though questions of security arise. In this paper, we propose an extension of the MA model called Seller – Buyer model (SB). This extension is made by making the server component mobile and using market mechanisms between the client agent (the buyer) and the server agent (the seller). While most of works in the area propose asymmetric security solutions, the SB model proposes a symmetric security approach for the MA. The SB model will give the developers a way to use, safely and efficiently, MA to build distributed applications on large-scale networks such as the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arbaugh, B., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. Paper presented at the IEEE Symposium on Security and Privacy (1997)
ASDK. IBM Aglets Software Development Kit Homepage, http://www.trl.ibm.co.jp/aglets (accessed in July 2010)
Chan, A.H.W., Wong, C.K.M., Wong, T.Y., Lyu, M.R.: Securing Mobile Agents for Electronic Commerce: an Experiment. In: Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures. Kluwer, B.V. Deventer (2000)
Baumann, J., Hohl, F., Rothernel, K., Straβer, M., Theilmann, W.: Mole: A mobile agent system. Journal of Software-Practice and Experience (SPE) 32(6), 575–603 (2002)
FIPA, Official site of the Foundation for Intelligent Physical Agents (2009), Obtained through the Internet: http://www.fipa.org (accessed June 15, 2009)
Garrigues, C., Robles, S., Borrell, J.: Securing dynamic itineraries for mobile agent applications. Journal of Network & Computer Applications 31(4), 487–508 (2008)
Garrigues, C., Midas, N., Buchanan, W., Robles, S., Borrell, J.: Protecting mobile agents from external replay attacks. Journal of System Software 82(2), 197–206 (2009)
Gulyás, L., Kovács, L., Micsik, A., Pataki, B., Zsámboki, I.: An Overview of Mobile Software Systems. MTA SZTAKI Technical Report. Department of Distributed Systems, MTA SZTAKI, Computer and Automation Research Institute of the Hungarian Academy of Sciences (2001)
Harrison, C.G., Chess, D.M., Kershenbaum, A.: Mobile Agents: Are they a good idea? IBM T.J. Watson Research Report. RC 19887 (1995)
Jansen, W., Mell, P., Marks, D., Karygiannis, T.: Mobile agent security. National Institute of Standards and Technology (NIST) Special Publication – 800-19, Gaithersburg, MD 20899, USA (October 1999)
Lange, D.B., Oshima, M.: Seven Good Reasons for Mobile Agents. Communications of the ACM 42(3), 88–89 (1999)
Menacer, D.E., Drias, H., Sibertin-Blanc, C.: The MP Architecture: towards a secure framework for mobile agents. International Journal of Agent-Oriented Software Engineering 4(4), 390–414 (2011)
Milojicic, D., Breugst, M., Busse, I., Campbell, J., Covaci, S., Friedman, B., Kosaka, K., Lange, D., Ono, K., Oshima, M., Tham, C., Virdhagriswaran, S., White, J.: MASIF: The OMG Mobile Agent System Interoperability Facility. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 50–67. Springer, Heidelberg (1998)
Papaioannou, T.: Mobile Agents: Are They Useful for Establishing a Virtual Presence in Space? In: Agents with Adjustable Autonomy Symposium, Part of the AAAI 1999. Spring Symposium Series (1999)
Ugurlu, S., Erdoğan, N.: SECMAP: A Secure Mobile Agent Platform. In: Pěchouček, M., Petta, P., Varga, L.Z. (eds.) CEEMAS 2005. LNCS (LNAI), vol. 3690, pp. 102–111. Springer, Heidelberg (2005)
Rouvrais, S.: Construction de services distribués: une approche à base d’agents mobiles. TSI-HERMES / RSTI – TSI 21(7), 985–1007 (2002)
Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 40–60. Springer, Heidelberg (1998)
Tschudin, C.: Mobile Agent Security. In: Intelligent Information Agent: Agent Based Information Discovery and Management in the Internet, pp. 431–446 (1999)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Menacer, D.E., Drias, H., Sibertin-Blanc, C. (2013). Towards a Security Solution for Mobile Agents. In: Rocha, Á., Correia, A., Wilson, T., Stroetmann, K. (eds) Advances in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36981-0_91
Download citation
DOI: https://doi.org/10.1007/978-3-642-36981-0_91
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36980-3
Online ISBN: 978-3-642-36981-0
eBook Packages: EngineeringEngineering (R0)