Skip to main content
Log in

Security and Robustness Enhanced Route Structures for Mobile Agents

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In this paper, we present a parallel dispatch model with secure route structures for protecting the dispatch route information of mobile agents. This model facilitates efficient dispatching of agents in a hierarchical manner, and ensures route security by exposing minimal route information to hosts. It also provides the capability for detecting attacks. Based on the secure dispatch model, two extensions are further presented. The first integrates parallel dispatch with small-scale serial migration to keep the number of mobile agents manageable while preserving similar dispatch performance. The second is a route robustness enhanced mechanism with substitute routes that allows temporarily unreachable hosts to be bypassed. We evaluated the various models both analytically and empirically, and report our findings here.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. http: //www.trl.ibm.co.jp/aglets/

  2. CCITT, Recommendation X. 509-1989, The directory-authentication framework, Consultation Committee, International Telephone and Telegraph, International Telecommunication Union, Geneva (1989).

  3. A. Corradi, R. Montanari and C. Stefanelli, Mobile agents in e-commerce applications, in: Proceedings of 19th IEEE International Conference on Distributed Computing Systems, Workshops on Electronic Commerce and Web-Based Applications, Austin, TX, USA, May 30‐June 4 (1999) pp. 59–64.

  4. http: //java.sun.com/products/

  5. G. Karjoth, D.B. Lange and M. Oshima, A security model for aglets, IEEE Internet Computing (July/August 1997) 68–77.

  6. D.B. Lange and M. Oshima, Programming and Deploying Java Mobile Agents with Aglets (Addison-Wesley, Reading, MA, 1998).

    Google Scholar 

  7. T. Li, C.K. Seng and K.Y. Lam, A secure route structure for information gathering, in: Proceedings of 2000 Pacific Rim International Conference on AI (2000).

  8. C. Panayionou, G. Samaras, E. Pitoura and P. Evripidou, Parallel computing using Java mobile agents, in: Proceedings of 25th EUROMICRO Conference, Milan, Italy, September 8‐10, Vol. 2 (1999) pp. 430–437.

    Google Scholar 

  9. S. Papastavrou, G. Samaras and E. Pitoura, Mobile agents for World Wide Web distributed database access, IEEE Transactions on Knowledge and Data Engineering 12(5) (September/October 2000) 802–820.

    Google Scholar 

  10. R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signature and public key cryptosystems, Communications of the ACM 21(2) (1978) 120–126.

    Google Scholar 

  11. T.D. Rodrigo and A. Stanski, The evolving future of agent-based electronic commerce, in: Electronic Commerce: Opportunity and Challenges, eds. S.M. Rahman and M.S. Raisinghani (Idea Group, Hershey, PA, 2000) pp. 337–351.

    Google Scholar 

  12. L.M. Silva, V. Batista, P. Martins and G. Scares, Using mobile agents for parallel processing, in: Proceedings of International Symposium on Distributed Objects and Applications (DOA'99), Edinburgh, Scotland (September 1999) pp. 34–42.

  13. V. Varadharajan, Security enhanced mobile agents, in: Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1‐4 (2000) pp. 200–209.

  14. Y. Wang, K.L. Tan, J. Ren and X. Pang, An agent-mediated, secure and efficient Internet marketplace, in: Proceedings of the 4th International Conference on Electronic Commerce Research (ICECR-4), Dallas, TX, November 8‐11 (2001) pp. 649–641.

  15. Y. Wang, Dispatching multiple mobile agents in parallel for visiting e-shops, in: Proceedings of 3rd International Conference on Mobile Data Management (MDM2002), IEEE Computer Society Press, Singapore, January 8‐11 (2002) pp. 61–68.

    Google Scholar 

  16. Y. Wang, K.L. Tan and X. Pang, Enabling the parallel dispatch of mobile agents with secure and robust routes, Unpublished manuscript available upon request from authors.

    Google Scholar 

  17. P. Wayner, Digital Copyright Protection (SP Professional, Boston, MA, 1997).

  18. D. Westhoff, M. Schneider, C. Unger and F. Kenderali, Methods for protecting a mobile agent's route, in: Proceedings of the Second International Information Security Workshop (ISW'99), Lecture Notes in Computer Science, Vol. 1729 (Springer, Berlin, 1999) pp. 57–71.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, Y., Pang, X. Security and Robustness Enhanced Route Structures for Mobile Agents. Mobile Networks and Applications 8, 413–423 (2003). https://doi.org/10.1023/A:1024587814610

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1024587814610

Navigation