Towards a Security Solution for Mobile Agents

  • Djamel Eddine MenacerEmail author
  • Habiba Drias
  • Christophe Sibertin-Blanc
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 206)


The current distributed systems are mainly based on the client – server model. The growing use of the Internet and the development of information and communication technologies has yielded more needs in terms of performance, reliability and security of information. By its synchronous nature, the client – server model no longer seems able to meet these new demands. Several new approaches have been proposed, for example the mobility of the code, involving the emergence of the mobile agents’ paradigm (MA). This paradigm certainly holds great promise, though questions of security arise. In this paper, we propose an extension of the MA model called Seller – Buyer model (SB). This extension is made by making the server component mobile and using market mechanisms between the client agent (the buyer) and the server agent (the seller). While most of works in the area propose asymmetric security solutions, the SB model proposes a symmetric security approach for the MA. The SB model will give the developers a way to use, safely and efficiently, MA to build distributed applications on large-scale networks such as the Internet.


Mobile Agent (MA) Seller-Buyer model Distributed systems Security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Arbaugh, B., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. Paper presented at the IEEE Symposium on Security and Privacy (1997)Google Scholar
  2. 2.
    ASDK. IBM Aglets Software Development Kit Homepage, (accessed in July 2010)
  3. 3.
    Chan, A.H.W., Wong, C.K.M., Wong, T.Y., Lyu, M.R.: Securing Mobile Agents for Electronic Commerce: an Experiment. In: Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures. Kluwer, B.V. Deventer (2000)Google Scholar
  4. 4.
    Baumann, J., Hohl, F., Rothernel, K., Straβer, M., Theilmann, W.: Mole: A mobile agent system. Journal of Software-Practice and Experience (SPE) 32(6), 575–603 (2002)zbMATHCrossRefGoogle Scholar
  5. 5.
    FIPA, Official site of the Foundation for Intelligent Physical Agents (2009), Obtained through the Internet: (accessed June 15, 2009)
  6. 6.
    Garrigues, C., Robles, S., Borrell, J.: Securing dynamic itineraries for mobile agent applications. Journal of Network & Computer Applications 31(4), 487–508 (2008)CrossRefGoogle Scholar
  7. 7.
    Garrigues, C., Midas, N., Buchanan, W., Robles, S., Borrell, J.: Protecting mobile agents from external replay attacks. Journal of System Software 82(2), 197–206 (2009)CrossRefGoogle Scholar
  8. 8.
    Gulyás, L., Kovács, L., Micsik, A., Pataki, B., Zsámboki, I.: An Overview of Mobile Software Systems. MTA SZTAKI Technical Report. Department of Distributed Systems, MTA SZTAKI, Computer and Automation Research Institute of the Hungarian Academy of Sciences (2001)Google Scholar
  9. 9.
    Harrison, C.G., Chess, D.M., Kershenbaum, A.: Mobile Agents: Are they a good idea? IBM T.J. Watson Research Report. RC 19887 (1995)Google Scholar
  10. 10.
    Jansen, W., Mell, P., Marks, D., Karygiannis, T.: Mobile agent security. National Institute of Standards and Technology (NIST) Special Publication – 800-19, Gaithersburg, MD 20899, USA (October 1999)Google Scholar
  11. 11.
    Lange, D.B., Oshima, M.: Seven Good Reasons for Mobile Agents. Communications of the ACM 42(3), 88–89 (1999)CrossRefGoogle Scholar
  12. 12.
    Menacer, D.E., Drias, H., Sibertin-Blanc, C.: The MP Architecture: towards a secure framework for mobile agents. International Journal of Agent-Oriented Software Engineering 4(4), 390–414 (2011)CrossRefGoogle Scholar
  13. 13.
    Milojicic, D., Breugst, M., Busse, I., Campbell, J., Covaci, S., Friedman, B., Kosaka, K., Lange, D., Ono, K., Oshima, M., Tham, C., Virdhagriswaran, S., White, J.: MASIF: The OMG Mobile Agent System Interoperability Facility. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 50–67. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  14. 14.
    Papaioannou, T.: Mobile Agents: Are They Useful for Establishing a Virtual Presence in Space? In: Agents with Adjustable Autonomy Symposium, Part of the AAAI 1999. Spring Symposium Series (1999)Google Scholar
  15. 15.
    Ugurlu, S., Erdoğan, N.: SECMAP: A Secure Mobile Agent Platform. In: Pěchouček, M., Petta, P., Varga, L.Z. (eds.) CEEMAS 2005. LNCS (LNAI), vol. 3690, pp. 102–111. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  16. 16.
    Rouvrais, S.: Construction de services distribués: une approche à base d’agents mobiles. TSI-HERMES / RSTI – TSI 21(7), 985–1007 (2002)Google Scholar
  17. 17.
    Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 40–60. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  18. 18.
    Tschudin, C.: Mobile Agent Security. In: Intelligent Information Agent: Agent Based Information Discovery and Management in the Internet, pp. 431–446 (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Djamel Eddine Menacer
    • 1
    Email author
  • Habiba Drias
    • 2
  • Christophe Sibertin-Blanc
    • 3
  1. 1.National Computer Science School of Algiers (ESI)AlgiersAlgeria
  2. 2.Houari Boumedienne Sciences and Technologies University of Algiers (USTHB)AlgiersAlgeria
  3. 3.Université Toulouse 1 Sciences SocialesToulouseFrance

Personalised recommendations