Abstract
Mobile Software Agent a technology that satisfies the requirements of intelligence in distributed systems; and has become increasingly used in serval domains but it is difficult to grantee its security because of its strong mobility over the network. And for today’s Internet, the Secure Socket Layer (SSL) and Transport Layer Security (TLS) are the most widely deployed security protocols that used to exchange data over the Internet securely based on encrypted communication. The present paper seeks a solution to meet the security requirements of communication in Multi-Agent System (MAS) based on the JADE framework and by using cryptographical techniques to ensure a secure encrypted communication using SSL/TLS protocol (Paulson LC, Inductive Analysis of the Internet Protocol TLS, [1, 2]).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
L.C. Paulson, Inductive Analysis of the Internet Protocol TLS
W. Goralski, Securing sockets with SSL. in The Illustrated Network, Morgan Kaufmann, pp. 585–606 (2009)
N. Constantinescu, C.I. Popirlan, Authentication Model Based on Multi-agent System, vol. 38, no. 2, pp. 59–68 (2011)
G. Stoneburner, Underlying Technical Models for Information Technology Security (Gaithersburg, MD, 2001)
T. Bayer, C. Reich, Security of Mobile Agents in Distributed Java Agent Development Framework (JADE) Platforms Security of Mobile Agents in Distributed Java Agent Development Framework (JADE) Platforms, no. April, 2017
S. Bijani, D. Robertson, A review of attacks and security approaches in open multiagent systems. Artif. Intell. Rev. 42(4), 607–636 (2014)
S. Alami-Kamouri, G. Orhanou, S. Elhajji, Overview of mobile agents and security. Proc. 2016 Int. Conf. Eng. MIS, ICEMIS (2016)
M. Kaur, S. Saxena, A Review of Security Techniques for Mobile Agents, pp. 807–812 (2017)
N. Borselius, Security in Multi-Agent Systems, no. April 2014
B. Amro, Mobile Agent Systems, Recent Security Threats and Counter Measures
J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, J. Wu, When HTTPS meets CDN: a case of authentication in delegated service, in Proceedings - IEEE Symposium on Security and Privacy (2014) pp. 67–82
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, P. Y. Strub, Implementing TLS with verified cryptographic security, in Proceedings - IEEE Symposium on Security and Privacy (2013) pp. 445–459
P. Kocher, Internet Engineering Task Force (IETF) A. Freier Request for Comments: 6101 P. Karlton Category: Historic Netscape Communications (2011)
A. Castro-Castilla, Traffic analysis of an SSL/TLS session—The Blog of Fourthbit (2014). http://blog.fourthbit.com/2014/12/23/traffic-analysis-of-an-ssl-slash-tls-session. Accessed 11 Aug 2018
IETF, “full-text,” Internet Eng. Task Force (2018)
S. Turner, Transport layer security. IEEE Internet Comput. 18(6), 60–63 (2014)
X. Vila, A. Schuster, A. Riera, Security for a multi-agent system based on JADE. Comput. Secur. 26(5), 391–400 (2007)
S. Berkovits, J.D. Guttman, V. Swarup, Authentication for mobile agents. Mob. Agents Secur. LNCS 1419, 114–136 (1998)
L. Ismail, U.A. Emirates, Authentication Mechanisms for Mobile Agents Leila Ismail United Arab Emirates University (2007)
S. Hanaoui, Y. Berguig, J. Laassiri, On the security Communication and Migration in Mobile Agent Systems (Springer, Cham, 2019) pp. 302–313
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Hanaoui, S., Laassiri, J., Berguig, Y. (2019). Security Requirements and Model for Mobile Agent Authentication. In: Elhoseny, M., Singh, A. (eds) Smart Network Inspired Paradigm and Approaches in IoT Applications. Springer, Singapore. https://doi.org/10.1007/978-981-13-8614-5_11
Download citation
DOI: https://doi.org/10.1007/978-981-13-8614-5_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8613-8
Online ISBN: 978-981-13-8614-5
eBook Packages: Computer ScienceComputer Science (R0)