Summary
Mobile agents are software entities consisting of code and data that can migrate autonomously from host to host executing their code. Despite its benefits, security issues strongly restrict the use of code mobility. The protection of mobile agents against the attacks of malicious hosts is considered the most difficult security problem to solve in mobile agents systems. The centre of our work is a new agent migration protocol that takes advantage of TPM technology. The protocol has been validated using AVISPA model checking toolsuite. In order to facilitate its adoption, we have developed a software library to access TPM functionality from agents and to support their secure migration. This paper presents hardware-based system to protect agent systems. Concretely our work is based on trusted platform module (TPM) protocol, which is the basis to build the solution. In order to build our solution on a robust basis, we validate this protocol by means of a model checking tool called AVISPA. Then as final result we provide a library to access to TPM (Trusted Platform Module) functionality from software agents. Along this paper we detail more relevant aspects of this library both in the development stage of it and while we use it to develop a system based agent.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
General Magic, Inc. The Telescript Language Reference (1996), http://www.genmagic.com-Telescript/TDE/TDEDOCS_HTML/telescript.html
Maña, A.: Protección de Software Basada en Tarjetas Inteligentes. Ph.D Thesis. University of Málaga (2003)
Hachez, G.: A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards. Ph.D Thesis. Universite Catholique de Louvain (2003), http://www.dice.ucl.ac.be/~hachez/thesis_gael_hachez.pdf
Gosling, J., Joy, B., Steele, G.: The Java Language Specification. Addison-Wesley, Reading (1996)
Necula, G.: Proof-Carrying Code. In: Proceedings of 24th Annual Symposium on Principles of Programming Languages (1997)
Gunter Carl, A., Peter, H., Scott, N.: Infrastructure for Proof-Referencing Code. In: Proceedings, Workshop on Foundations of Secure Mobile Code (March 1997)
Yee, B.S.: A Sanctuary for Mobile Agents. Secure Internet Programming (1999)
Trusted Computing Group: TCG Specifications (2005), https://www.trustedcomputinggroup.org/specs/
Wooldrigde, M.: Agent-based Software Engineering. IEE Proceedings on Software Engineering 144(1), 26–37 (1997)
Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.J.: Robust Object Watermarking: Application to Code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000), http://www.dice.ucl.ac.be/crypto/publications/1999/codemark.pdf
Collberg, C., Thomborson, C.: Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. University of Auckland Technical Report 170 (2000)
Maña, A., Muñoz, A., Serrano, D.: Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence. In: Fourth International Conference, Ubiquitous Intelligence and Computing, Hong Kong, China. LNCS. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Muñoz, A., Maña, A. (2009). A Hardware Based Infrastructure for Agent Protection. In: Corchado, J.M., Tapia, D.I., Bravo, J. (eds) 3rd Symposium of Ubiquitous Computing and Ambient Intelligence 2008. Advances in Soft Computing, vol 51. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85867-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-85867-6_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85866-9
Online ISBN: 978-3-540-85867-6
eBook Packages: EngineeringEngineering (R0)