Abstract
In this paper, we present a parallel dispatch model with secure route structures for protecting the dispatch route information of mobile agents. This model facilitates efficient dispatching of agents in a hierarchical manner, and ensures route security by exposing minimal route information to hosts. It also provides the capability for detecting attacks. Based on the secure dispatch model, two extensions are further presented. The first integrates parallel dispatch with small-scale serial migration to keep the number of mobile agents manageable while preserving similar dispatch performance. The second is a route robustness enhanced mechanism with substitute routes that allows temporarily unreachable hosts to be bypassed. We evaluated the various models both analytically and empirically, and report our findings here.
Similar content being viewed by others
References
http: //www.trl.ibm.co.jp/aglets/
CCITT, Recommendation X. 509-1989, The directory-authentication framework, Consultation Committee, International Telephone and Telegraph, International Telecommunication Union, Geneva (1989).
A. Corradi, R. Montanari and C. Stefanelli, Mobile agents in e-commerce applications, in: Proceedings of 19th IEEE International Conference on Distributed Computing Systems, Workshops on Electronic Commerce and Web-Based Applications, Austin, TX, USA, May 30‐June 4 (1999) pp. 59–64.
http: //java.sun.com/products/
G. Karjoth, D.B. Lange and M. Oshima, A security model for aglets, IEEE Internet Computing (July/August 1997) 68–77.
D.B. Lange and M. Oshima, Programming and Deploying Java Mobile Agents with Aglets (Addison-Wesley, Reading, MA, 1998).
T. Li, C.K. Seng and K.Y. Lam, A secure route structure for information gathering, in: Proceedings of 2000 Pacific Rim International Conference on AI (2000).
C. Panayionou, G. Samaras, E. Pitoura and P. Evripidou, Parallel computing using Java mobile agents, in: Proceedings of 25th EUROMICRO Conference, Milan, Italy, September 8‐10, Vol. 2 (1999) pp. 430–437.
S. Papastavrou, G. Samaras and E. Pitoura, Mobile agents for World Wide Web distributed database access, IEEE Transactions on Knowledge and Data Engineering 12(5) (September/October 2000) 802–820.
R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signature and public key cryptosystems, Communications of the ACM 21(2) (1978) 120–126.
T.D. Rodrigo and A. Stanski, The evolving future of agent-based electronic commerce, in: Electronic Commerce: Opportunity and Challenges, eds. S.M. Rahman and M.S. Raisinghani (Idea Group, Hershey, PA, 2000) pp. 337–351.
L.M. Silva, V. Batista, P. Martins and G. Scares, Using mobile agents for parallel processing, in: Proceedings of International Symposium on Distributed Objects and Applications (DOA'99), Edinburgh, Scotland (September 1999) pp. 34–42.
V. Varadharajan, Security enhanced mobile agents, in: Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1‐4 (2000) pp. 200–209.
Y. Wang, K.L. Tan, J. Ren and X. Pang, An agent-mediated, secure and efficient Internet marketplace, in: Proceedings of the 4th International Conference on Electronic Commerce Research (ICECR-4), Dallas, TX, November 8‐11 (2001) pp. 649–641.
Y. Wang, Dispatching multiple mobile agents in parallel for visiting e-shops, in: Proceedings of 3rd International Conference on Mobile Data Management (MDM2002), IEEE Computer Society Press, Singapore, January 8‐11 (2002) pp. 61–68.
Y. Wang, K.L. Tan and X. Pang, Enabling the parallel dispatch of mobile agents with secure and robust routes, Unpublished manuscript available upon request from authors.
P. Wayner, Digital Copyright Protection (SP Professional, Boston, MA, 1997).
D. Westhoff, M. Schneider, C. Unger and F. Kenderali, Methods for protecting a mobile agent's route, in: Proceedings of the Second International Information Security Workshop (ISW'99), Lecture Notes in Computer Science, Vol. 1729 (Springer, Berlin, 1999) pp. 57–71.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Wang, Y., Pang, X. Security and Robustness Enhanced Route Structures for Mobile Agents. Mobile Networks and Applications 8, 413–423 (2003). https://doi.org/10.1023/A:1024587814610
Issue Date:
DOI: https://doi.org/10.1023/A:1024587814610