Skip to main content

Security and Trust on Mobile Agent Platforms: A Survey

  • Conference paper
  • First Online:
Agent and Multi-Agent Systems: Technology and Applications (KES-AMSTA 2017)

Abstract

Mobile agent technologies are known for their capacity to develop and construct distributed, heterogeneous and interoperable systems. Despite the presence of several platforms for the development of mobile agent applications, security issues act as a main deterrent against such trends. Based on this, we conducted a comparative study of the most promising and existing mobile agent platforms, showing the diverse security features employed to address various threats. We investigate also the trust models used by the platforms. The established study focuses on the contributions to verify security criteria by the used security mechanisms in every studied platform. This study is important not only to allow practitioners pick the most suitable platforms to meet their security requirements, but also to allow researchers address the voids by ameliorating the concluded limits and proposing possible improvements of new versions of these platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aggarwal, S., Bhardwaj, S., Kumar, P.: Security approaches for mobile multi-agent system. Int. J. Emerg. Technol. Adv. Eng. 2(12), 681–687 (2012)

    Google Scholar 

  2. Kravari, K., Bassiliades, N.: A survey of agent platforms. J. Artif. Soc. Soc. Simul. 18, 11 (2015)

    Google Scholar 

  3. Jansen, W., Karygiannis, T.: Mobile agent security, National Institute of Standards and Technology (2000)

    Google Scholar 

  4. Braubach, L., Jander, K., Pokahr, A.: A practical security infrastructure for open multi-agent systems. In: 11th German Conference, MATES 2013, Koblenz (2013)

    Google Scholar 

  5. Lange, D.B., Mitsuru, O.: Programming and Deploying Java Mobile Agents Aglets. Addison-Wesley Longman Publishing, Amsterdam (1998)

    Google Scholar 

  6. Bellavista, P., Corradi, A., Stefanelli, C.: A secure and open mobile agent programming environment. In: Fourth International Symposium on Autonomous Decentralized Systems (1999)

    Google Scholar 

  7. Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents integrity in e-commerce applications. In: 19th IEEE International Conference on Distributed Computing Systems (1999)

    Google Scholar 

  8. Jade Security Guide (2005). http://jade.cselt.it/doc/tutorials/JADE_Security.pdf

  9. Bellifemine, F., Cairea, G., Poggib, A., Rimassac, G.: JADE: a software framework for developing multi-agent applications. Lessons learned. J. Inf. Softw Technol. 50, 10–21 (2008)

    Article  Google Scholar 

  10. Helsinger, A., Thome, M., Wright, T.: Cougaar: a scalable, distributed multi-agent architecture. In: IEEE International Conference on Systems, Man and Cybernetics (2004)

    Google Scholar 

  11. Feiertag, R., Rho J., Rosset S.: Using security mechanisms in Cougaar, 1st Open Cougaar Conference (2004)

    Google Scholar 

  12. Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET-secure agent communication model. In: 11th International Conference on Computer and Information Technology, ICCIT (2008)

    Google Scholar 

  13. Poggi, A., Rimassa, G., Tomaiuol, M.: Multi-user and security support for multi-agent systems. In: WOA (2001)

    Google Scholar 

  14. Conti, V., Vitabile, S., Pilato, G., Sorbello, F.: An enhanced authentication system for the JADE-S platform. WSEAS Trans. Inf. Sci. Appl. 1, 178–183 (2004)

    Google Scholar 

  15. Vitabile, S., Pilato, G., Conti, V., Gioè, G., Sorbello, F.: Biometric features for mobile agents ownership. IPSI BgD Trans. Internet Res. 1, 81–89 (2004)

    Google Scholar 

  16. Vitabile, S., Conti, V., Militello, C., Sorbello, F.: An extended JADE-S based framework for developing secure multi-agent systems. Comput. Stan. Interfaces 31, 913–930 (2009)

    Article  Google Scholar 

  17. http://jade.tilab.com/doc/tutorials/PKI_Guide.pdf

  18. Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E.: SAS: a secure aglet server. In: Computer Security Conference (2007)

    Google Scholar 

  19. Cabri, G., Leonardi, L., Zambonelli, F.: Auction-based agent negotiation via programmable tuple spaces. In: 4th International Workshop, CIA, Boston, MA, USA (2000)

    Google Scholar 

  20. http://ultralog.net

  21. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29, 38–47 (1996)

    Article  Google Scholar 

  22. Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 9, 40–48 (1994)

    Article  Google Scholar 

  23. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web (2003)

    Google Scholar 

  24. http://www.ihmc.us/research/projects/KAoS/

  25. Singh, A., Ahuja, P.: Robust algorithm for securing an agent hosting platform. Int. J. Adv. Technol. 3, 84–91 (2012)

    Google Scholar 

  26. Ahuja, P., Sharma, V.: A JADE implemented mobile agent based host platform security. Comput. Eng. Intell. Syst. 3, 8–19 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Donies Samet .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Samet, D., Ktata, F.B., Ghedira, K. (2018). Security and Trust on Mobile Agent Platforms: A Survey. In: Jezic, G., Kusek, M., Chen-Burger, YH., Howlett, R., Jain, L. (eds) Agent and Multi-Agent Systems: Technology and Applications. KES-AMSTA 2017. Smart Innovation, Systems and Technologies, vol 74. Springer, Cham. https://doi.org/10.1007/978-3-319-59394-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59394-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59393-7

  • Online ISBN: 978-3-319-59394-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics