Skip to main content

Security Requirements and Model for Mobile Agent Authentication

  • Chapter
  • First Online:
Smart Network Inspired Paradigm and Approaches in IoT Applications

Abstract

Mobile Software Agent a technology that satisfies the requirements of intelligence in distributed systems; and has become increasingly used in serval domains but it is difficult to grantee its security because of its strong mobility over the network. And for today’s Internet, the Secure Socket Layer (SSL) and Transport Layer Security (TLS) are the most widely deployed security protocols that used to exchange data over the Internet securely based on encrypted communication. The present paper seeks a solution to meet the security requirements of communication in Multi-Agent System (MAS) based on the JADE framework and by using cryptographical techniques to ensure a secure encrypted communication using SSL/TLS protocol (Paulson LC, Inductive Analysis of the Internet Protocol TLS, [1, 2]).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. L.C. Paulson, Inductive Analysis of the Internet Protocol TLS

    Google Scholar 

  2. W. Goralski, Securing sockets with SSL. in The Illustrated Network, Morgan Kaufmann, pp. 585–606 (2009)

    Chapter  Google Scholar 

  3. N. Constantinescu, C.I. Popirlan, Authentication Model Based on Multi-agent System, vol. 38, no. 2, pp. 59–68 (2011)

    Google Scholar 

  4. G. Stoneburner, Underlying Technical Models for Information Technology Security (Gaithersburg, MD, 2001)

    Book  Google Scholar 

  5. T. Bayer, C. Reich, Security of Mobile Agents in Distributed Java Agent Development Framework (JADE) Platforms Security of Mobile Agents in Distributed Java Agent Development Framework (JADE) Platforms, no. April, 2017

    Google Scholar 

  6. S. Bijani, D. Robertson, A review of attacks and security approaches in open multiagent systems. Artif. Intell. Rev. 42(4), 607–636 (2014)

    Article  Google Scholar 

  7. S. Alami-Kamouri, G. Orhanou, S. Elhajji, Overview of mobile agents and security. Proc. 2016 Int. Conf. Eng. MIS, ICEMIS (2016)

    Google Scholar 

  8. M. Kaur, S. Saxena, A Review of Security Techniques for Mobile Agents, pp. 807–812 (2017)

    Google Scholar 

  9. N. Borselius, Security in Multi-Agent Systems, no. April 2014

    Google Scholar 

  10. B. Amro, Mobile Agent Systems, Recent Security Threats and Counter Measures

    Google Scholar 

  11. J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, J. Wu, When HTTPS meets CDN: a case of authentication in delegated service, in Proceedings - IEEE Symposium on Security and Privacy (2014) pp. 67–82

    Google Scholar 

  12. K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, P. Y. Strub, Implementing TLS with verified cryptographic security, in Proceedings - IEEE Symposium on Security and Privacy (2013) pp. 445–459

    Google Scholar 

  13. P. Kocher, Internet Engineering Task Force (IETF) A. Freier Request for Comments: 6101 P. Karlton Category: Historic Netscape Communications (2011)

    Google Scholar 

  14. A. Castro-Castilla, Traffic analysis of an SSL/TLS session—The Blog of Fourthbit (2014). http://blog.fourthbit.com/2014/12/23/traffic-analysis-of-an-ssl-slash-tls-session. Accessed 11 Aug 2018

  15. IETF, “full-text,” Internet Eng. Task Force (2018)

    Google Scholar 

  16. S. Turner, Transport layer security. IEEE Internet Comput. 18(6), 60–63 (2014)

    Article  Google Scholar 

  17. X. Vila, A. Schuster, A. Riera, Security for a multi-agent system based on JADE. Comput. Secur. 26(5), 391–400 (2007)

    Article  Google Scholar 

  18. S. Berkovits, J.D. Guttman, V. Swarup, Authentication for mobile agents. Mob. Agents Secur. LNCS 1419, 114–136 (1998)

    Article  Google Scholar 

  19. L. Ismail, U.A. Emirates, Authentication Mechanisms for Mobile Agents Leila Ismail United Arab Emirates University (2007)

    Google Scholar 

  20. S. Hanaoui, Y. Berguig, J. Laassiri, On the security Communication and Migration in Mobile Agent Systems (Springer, Cham, 2019) pp. 302–313

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanae Hanaoui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Hanaoui, S., Laassiri, J., Berguig, Y. (2019). Security Requirements and Model for Mobile Agent Authentication. In: Elhoseny, M., Singh, A. (eds) Smart Network Inspired Paradigm and Approaches in IoT Applications. Springer, Singapore. https://doi.org/10.1007/978-981-13-8614-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-8614-5_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-8613-8

  • Online ISBN: 978-981-13-8614-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics