Evaluating Mobile Agent Platform Security

  • Axel Bürkle
  • Alice Hertel
  • Wilmuth Müller
  • Martin Wieser
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4196)


Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed to assess agent platform security. These tests focus on malicious agents trying to attack other agents or the agency. Currently, they have been carried out for two agent platforms: JADE and SeMoA. These tests show which of the known theoretical security problems are relevant in practice. Furthermore, they reveal how these problems were addressed by the respective platform and what security flaws are present.


Mobile Agent User Agent Agent Platform Secure Socket Layer Endless Loop 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Braun, P., Rossak, W.: Mobile Agents. Basic Concepts, Mobility Models & the Tracy Toolkit. dpunkt.verlag (2005)Google Scholar
  2. 2.
    Karmouch, A., Magedanz, T., Delgado, J. (eds.) MATA 2002. LNCS, vol. 2521. Springer, Heidelberg (2002)Google Scholar
  3. 3.
    Yang, K., Galis, A., Guo, X., Liu, D.: Rule-Driven Mobile Intelligent Agents for Real-Time Configuration of IP Networks. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2773, pp. 921–928. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Fok, C., Roman, G., Lu, C.: Mobile Agent Middleware for Sensor Networks: An Application Case Study. In: Proc. of Fourth Int. Symposium on Information Processing in Sensor Networks, IEEE CNF 2005, pp. 382–387 (2005)Google Scholar
  5. 5.
    Brewington, B., Gray, R., Moizumi, K., Kotz, D., Cybenko, G., Rus, D.: Mobile agents in distributed information retrieval. In: Intelligent Information Agents. Springer, Heidelberg (1999)Google Scholar
  6. 6.
    Thati, P., Chang, P., Agha, G.: Crawlets: Agents for high performance web search engine. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, pp. 119–134. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Geirland, J.: The Feature: Mobile Intelligent Agents (2002), http://www.thefeature.com/article?articleid=26051
  8. 8.
    Gray, R., Kotz, D., Cybenko, G., Rus, D.: D’Agents: Security in a Multiple-Language, Mobile-Agent System. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  9. 9.
    Jansen, W., Karygiannis, T.: Mobile Agent Security. Special Publication. NIST, pp. 800–819 (1999)Google Scholar
  10. 10.
    Roth, V.: Programming Satan’s Agents. In: Fischer, K., Hutter, D. (eds.) Proc. of the 1st Int. Workshop on Secure Mobile Multi-Agent Systems, SEMAS 2001. Elsevier, Amsterdam (2002)Google Scholar
  11. 11.
    Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  12. 12.
    Jansen, W.: A Privilege Management Scheme for Mobile Agent Systems. In: SEMAS 2001, First International Workshop on Security of Mobile Multiagent Systems. Electronic Notes in Theoretical Computer Science, vol. 63 (2002)Google Scholar
  13. 13.
    Tschudin, C.: Mobile Agent Security. In: Klusch, M. (ed.) Intelligent information agents: agent based information discovery and management in the Internet, ch. 18. Springer, Heidelberg (1999)Google Scholar
  14. 14.
    Vigna, G.: Protecting Mobile Agents Through Tracing. In: Proc. of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvalskyla, Finland (1997)Google Scholar
  15. 15.
    Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: JADE - A White Paper (2003), http://jade.tilab.com
  16. 16.
    SeMoA (2006), http://www.semoa.org
  17. 17.
    Santana Torrellas, G.: A Network Security Architectural Approach for Systems Integrity using Multi Agent Systems Engineering. In: Int. Symposium on Parallel Architectures, Algorithms and Networks (ISPAN) (2004)Google Scholar
  18. 18.
    Borselius, N.: Mobile Agent Security. Electronics & Communication Engineering Journal (2002)Google Scholar
  19. 19.
    JADE Board: JADE Security Guide (2005), http://jade.tilab.com
  20. 20.
    Cortese, E., Caire, G., Bochicchio, R.: JADE Test Suite User Guide (2004), http://jade.tilab.com
  21. 21.
    Roth, V., Jalali, M., Pinsdorf, U.: Secure Mobile Agents (SeMoA) (2006), http://www.inigraphics.net/press/brochures/sec_broch/sec/Security.pdf

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Axel Bürkle
    • 1
  • Alice Hertel
    • 1
  • Wilmuth Müller
    • 1
  • Martin Wieser
    • 1
  1. 1.Fraunhofer Institute for Information and Data ProcessingKarlsruheGermany

Personalised recommendations