Protecting Mobile Agent Loops

  • J. Cucurull
  • J. Ametller
  • J. A. Ortega-Ruiz
  • S. Robles
  • J. Borrell
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3744)

Abstract

A mobile agent’s itinerary describes the set of hosts visited during the agent’s travel, and must be protected against malicious entities trying to access and/or modify it for their own benefit. Protection mechanisms must be put in place, but we should avoid imposing unnecessary limitations on the agent’s ability to choose its itinerary in an as flexible as possible way. In this article, we extend previous work on itinerary protection protocols to include loops among the allowable protected itineraries for roaming agents. Our agents can thus traverse a whole new range of paths in a secure way.

Keywords

Mobile Agents Security Itinerary Protection Loops 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ametller, J., Robles, S., Ortega-Ruiz, J.A.: Self-protected mobile agents. In: AAMAS 2004: Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, Washington, DC, USA, pp. 362–367. IEEE Computer Society, Los Alamitos (2004)Google Scholar
  2. 2.
    Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents protection in the internet environment. In: 23rd Annual International Computer Software and Applications Conference (1999)Google Scholar
  3. 3.
    Giansiracusa, M., Russell, S., Clark, A., Roth, V.: Macro-level attention to mobile agent security: Introducing the mobile agent secure hub infrastructure concept. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 343–357. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
    Karnik, N.M., Tripathi, A.R.: Security in the Ajanta mobile agent system. Software Practice and Experience 31(4), 301–329 (2001)MATHCrossRefGoogle Scholar
  5. 5.
    R. Laboratories. PKCS 7: Cryptographic message syntax standard (1993)Google Scholar
  6. 6.
    Mir, J., Borrell, J.: Protecting general flexible itineraries of mobile agents. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, p. 382. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  7. 7.
    Mir, J., Borrell, J.: Protecting mobile agent itineraries. In: Horlait, E., Magedanz, T., Glitho, R.H. (eds.) MATA 2003. LNCS, vol. 2881, pp. 275–285. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Roth, V.: Empowering mobile software agents. In: Suri, N. (ed.) MA 2002. LNCS, vol. 2535, pp. 47–63. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Roth, V.: On the robustness of some cryptographic protocols for mobile agent protection. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, p. 1. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  10. 10.
    Roth, V.: Programming satan’s agents. Electr. Notes Theor. Comput. Sci. 63 (2001)Google Scholar
  11. 11.
    Straßer, M., Rothermel, K., Maiöfer, C.: Providing Reliable Agents for Electronic Commerce. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 241–253. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  12. 12.
    Tsipenyuk, Y., Yee, B.: Detecting external agent replay and state modification attacks (February 2005), http://www-cse.ucsd.edu/~ytsipeny/home/research/paper.pdf
  13. 13.
    Westhoff, D., Schneider, M., Unger, C., Kaderali, F.: Protecting a Mobile Agent’s Route against Collusions. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, p. 215. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  14. 14.
    White, J.E.: Telescript technology: Mobile agents. In: Bradshaw, J. (ed.) Software Agents, AAAI Press/MIT Press, Menlo Park (1996)Google Scholar
  15. 15.
    Yee, B.S.: A sanctuary for mobile agents. Secure Internet Programming, 261–273 (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • J. Cucurull
    • 1
  • J. Ametller
    • 1
  • J. A. Ortega-Ruiz
    • 1
  • S. Robles
    • 1
  • J. Borrell
    • 1
  1. 1.Department of Information and Communications EngineeringAutonomous University of BarcelonaBellaterraSpain

Personalised recommendations