Advertisement

A Secure Route Structure for Information Gathering Agent

  • Tieyan Li
  • Chuk -Yang Seng
  • Kwok -Yan Lam
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1881)

Abstract

Mobile agents are more likely to be launched over the Internet to collect information. However, an autonomous agent running on a host may suffer attacks if the host is malicious. Possible targets of attacks include: the collected information or the agent itself, including its route. In this paper, we propose a new secure route structure, which provides enhanced security and robust solution to protect an agent’s route. Besides security and robustness, the solution also offers features such as: flexibility in routing and high performance. In addition, we highlight areas where we can apply agents to collect information, with the use of the secure route structure: electronic commerce and intrusion detection system.

Keywords

Detection Object Mobile Agent Shared Secret Intrusion Detection System Electronic Commerce 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    M. Wooldridge and N.R Jennings. Intelligent Agents: Theory and Practice. Knowledge Engineering Review 10(2), 1995.Google Scholar
  2. 2.
    G. Vigna (Ed.). Mobile Agents and Security. Springer Verlag, LNCS 1419, 1998.Google Scholar
  3. 3.
    K. Rothermel and M. Strasser. A Fault-tolerant Protocol for Providing the Exactly-once Property of Mobile Agents. Proceedings of the Seventeenth IEEE Symposium on Reliable Distributed Systems, 1998.Google Scholar
  4. 4.
    D. Westhoff, M. Schneider, C. Unger and F. Kenderali. Methods for Protecting a Mobile Agent’s Route. Proceedings of the Second International Information Security Workshop, (ISW’99), 1999. Springer Verlag, LNCS 1729, 1999.Google Scholar
  5. 5.
    M. Dalmeijer, E. Rietjens, D. Hammer, A. Aerts and M. Soede. A Reliable Mobile Agents Architecture. Proceedings of the First International Symposium on Object-Oriented Real-time Distributed Computing, (ISORC 98), 1998.Google Scholar
  6. 6.
    H. Maass. Location-aware Mobile Applications Based on Directory Services. Mobile Networks and Applications 3(1998), Baltzer Science Publishers BV, 1998.Google Scholar
  7. 7.
    W. Van Belle, K. Verelst and T. D’Hondt. Location Transparent Routing in Mobile Agent Systems Merging Name Lookups with Routing. Proceedings of the Seventh IEEE Workshop on Future Trends of Distributed Computing Systems, 1999.Google Scholar
  8. 8.
    S. Lazar, I. Weerakoon and D. Sidhu. A Scalable Location Tracking and Message Delivery Scheme for Mobile Agents. Proceedings of the Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, (WET ICE’ 98), 1998.Google Scholar
  9. 9.
    CCITT, Recommendation X.509-1989. The Directory-Authentication Framework. Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva, 1989.Google Scholar
  10. 10.
    X.F. Wang, X. Yi, K.Y. Lam and E. Okamoto. Secure Information Gathering Agent for Internet Trading. Proceedings of the Eleventh Australian Joint Conference on Artificial Intelligence, Brisbane, Australia, 13 July 1998. Springer Verlag, LNAI 1544, 1998.Google Scholar
  11. 11.
    J.S. Balasubramaniyan, J.O. Garcia-Fernandez, D. Isacoff, E. Spafford and D. Zam-boni. An Architecture for Intrusion Detection Using Autonomous Agents. Proceedings of the Fourteenth Annual Computer Security Applications Conference, 1998.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Tieyan Li
    • 1
  • Chuk -Yang Seng
    • 1
  • Kwok -Yan Lam
    • 1
  1. 1.Centre for Systems Security School of ComputingNational University of SingaporeSingapore

Personalised recommendations