Abstract
Mobile agent technologies are known for their capacity to develop and construct distributed, heterogeneous and interoperable systems. Despite the presence of several platforms for the development of mobile agent applications, security issues act as a main deterrent against such trends. Based on this, we conducted a comparative study of the most promising and existing mobile agent platforms, showing the diverse security features employed to address various threats. We investigate also the trust models used by the platforms. The established study focuses on the contributions to verify security criteria by the used security mechanisms in every studied platform. This study is important not only to allow practitioners pick the most suitable platforms to meet their security requirements, but also to allow researchers address the voids by ameliorating the concluded limits and proposing possible improvements of new versions of these platforms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aggarwal, S., Bhardwaj, S., Kumar, P.: Security approaches for mobile multi-agent system. Int. J. Emerg. Technol. Adv. Eng. 2(12), 681–687 (2012)
Kravari, K., Bassiliades, N.: A survey of agent platforms. J. Artif. Soc. Soc. Simul. 18, 11 (2015)
Jansen, W., Karygiannis, T.: Mobile agent security, National Institute of Standards and Technology (2000)
Braubach, L., Jander, K., Pokahr, A.: A practical security infrastructure for open multi-agent systems. In: 11th German Conference, MATES 2013, Koblenz (2013)
Lange, D.B., Mitsuru, O.: Programming and Deploying Java Mobile Agents Aglets. Addison-Wesley Longman Publishing, Amsterdam (1998)
Bellavista, P., Corradi, A., Stefanelli, C.: A secure and open mobile agent programming environment. In: Fourth International Symposium on Autonomous Decentralized Systems (1999)
Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents integrity in e-commerce applications. In: 19th IEEE International Conference on Distributed Computing Systems (1999)
Jade Security Guide (2005). http://jade.cselt.it/doc/tutorials/JADE_Security.pdf
Bellifemine, F., Cairea, G., Poggib, A., Rimassac, G.: JADE: a software framework for developing multi-agent applications. Lessons learned. J. Inf. Softw Technol. 50, 10–21 (2008)
Helsinger, A., Thome, M., Wright, T.: Cougaar: a scalable, distributed multi-agent architecture. In: IEEE International Conference on Systems, Man and Cybernetics (2004)
Feiertag, R., Rho J., Rosset S.: Using security mechanisms in Cougaar, 1st Open Cougaar Conference (2004)
Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET-secure agent communication model. In: 11th International Conference on Computer and Information Technology, ICCIT (2008)
Poggi, A., Rimassa, G., Tomaiuol, M.: Multi-user and security support for multi-agent systems. In: WOA (2001)
Conti, V., Vitabile, S., Pilato, G., Sorbello, F.: An enhanced authentication system for the JADE-S platform. WSEAS Trans. Inf. Sci. Appl. 1, 178–183 (2004)
Vitabile, S., Pilato, G., Conti, V., Gioè, G., Sorbello, F.: Biometric features for mobile agents ownership. IPSI BgD Trans. Internet Res. 1, 81–89 (2004)
Vitabile, S., Conti, V., Militello, C., Sorbello, F.: An extended JADE-S based framework for developing secure multi-agent systems. Comput. Stan. Interfaces 31, 913–930 (2009)
Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E.: SAS: a secure aglet server. In: Computer Security Conference (2007)
Cabri, G., Leonardi, L., Zambonelli, F.: Auction-based agent negotiation via programmable tuple spaces. In: 4th International Workshop, CIA, Boston, MA, USA (2000)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29, 38–47 (1996)
Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 9, 40–48 (1994)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web (2003)
Singh, A., Ahuja, P.: Robust algorithm for securing an agent hosting platform. Int. J. Adv. Technol. 3, 84–91 (2012)
Ahuja, P., Sharma, V.: A JADE implemented mobile agent based host platform security. Comput. Eng. Intell. Syst. 3, 8–19 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Samet, D., Ktata, F.B., Ghedira, K. (2018). Security and Trust on Mobile Agent Platforms: A Survey. In: Jezic, G., Kusek, M., Chen-Burger, YH., Howlett, R., Jain, L. (eds) Agent and Multi-Agent Systems: Technology and Applications. KES-AMSTA 2017. Smart Innovation, Systems and Technologies, vol 74. Springer, Cham. https://doi.org/10.1007/978-3-319-59394-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-59394-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59393-7
Online ISBN: 978-3-319-59394-4
eBook Packages: EngineeringEngineering (R0)