Mobile Agent Security Based on Artificial Immune System

  • Zaki Brahmi
  • Amine Lini
  • Mohamed Mohsen Gammoudi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 299)


Mobile Agent (MA) is an autonomous entity that can move from a host to another under self-control. It’s a technology for distributed system computing and communication. Although, it creates serious theoretical and practical problems like heterogeneity, preservation of communication, shared resource management and particularly security problem that represents a crucial point for the use of mobile agent applications. To perform its tasks, the agent must move from one site to another, which makes its behavior more vulnerable to different types of attack. To tackle this problem and improve the security of mobile agents, we propose an approach based on Artificial Immune System (AIS). DNA technique is used for code’s encryption and fragmentation. Thus, this new solution is twofold: it protects agents during their migration and it ensures the verification of their trusts while their reception by the destination.


Mobile Agent Security Artificial Immune System Fragment Gene DNA Trust 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    de Castro, L.N., Von Zuben, F.J.: Artificial immune system, Part I - Basic theory and applications. Technical Report, RT DCA 01/99 (December 1999)Google Scholar
  2. 2.
    Dasgupta, D., Nino, L.F.: Immunological Computation. Theory and Applications. Taylor and Francis Group, LLC (2009)Google Scholar
  3. 3.
    Von Zuben, F.J., De Castro, L.N.: aiNet: An artificial Immune Network for Data analysis. In: Abbass, H.A., Sarker, R.A., Newlton, C.S. (eds.) Data Mining: A Heuristic Approach, ch. XII, pp. 213–259. Idea Group Publishing, USA (2001)Google Scholar
  4. 4.
    Kawamoto, H., Miyake, S., Miyasaka, M., Ohteki, T., Sorimachi, N., Takahama, Y., Taki, S.: Your Amazing Immune System - How it protects your body. French Translation: European Federation of Immunological Societies in 2010 (2010)Google Scholar
  5. 5.
    Mishra, A., Choudhary, A.: Mobile Agent:Security Issues and Solution. International Journal of Computer Technology and Electronics Engineering (IJCTEE) 2(6) (December 2012)Google Scholar
  6. 6.
    Snehi, J., Snehi, M., Goyal, S.: Security Threats to Mobile Agents. In: ACAI 2011, July 21-July 22 (2011)Google Scholar
  7. 7.
    Dadhich, P., Dutta, K., Govil, M.C.: Security Issues in Mobile Agents. International Journal of Computer Applications 11(4), 0975–8887 (2010)Google Scholar
  8. 8.
    Shen, Z., Tong, Q.: A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. In: Ninth International Conference on Hybrid Intelligent Systems 2009. IEEE Computer Society (2009)Google Scholar
  9. 9.
    Ilahi, M., Brahmi, Z., Gammoudi, M.M.: Enhancing Decentralized MAS-Based Framework for Composite Web Services Orchestration and Exception Handling by Means of Mobile Agents Technology. In: Liu, J., Wu, J., Yao, Y., Nishida, T. (eds.) AMT 2009. LNCS, vol. 5820, pp. 347–356. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Rajguru, P.V., Deshmukh, S.B.: Current trends and analysis of mobile agent application. World Journal of Science and Technology, 01–06 (2012)Google Scholar
  11. 11.
    Hightower, R.R., Forrest, S., Perelson, A.S.: The evolution of emergent organization in immune system gene libraries. In: Pro. of the 6th International Conference on Genetic Algorithms, pp. 344–350 (1995)Google Scholar
  12. 12.
    Qiu, W., Guan, H., Jiang, X., Huang, Z.: Group oriented Secure Routing Protocol of Mobile Agents. In: International Conference on Computational Intelligence and Security Workshops 2007. IEEE Computer Society (2007)Google Scholar
  13. 13.
    De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering application. In: Proc. of GECCO 2000, Workshop Proceeding, pp. 36–37 (2000)Google Scholar
  14. 14.
    Timmis, J.: Artificial Immune Systems: A novel data analysis technique inspired by the immune network theory. PhD Thesis, University of Wales (2001)Google Scholar
  15. 15.
    Ahuja, P., Sharma, V.: A Review on Mobile Agent Security. International Journal of Recent Technology and Engineering (IJRTE) 1(2) (June 2012) ISSN: 2277-3878Google Scholar
  16. 16.
    Herrero, A., Navarro, M., Corchado, E., Julian, V.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst. 29(1), 250–261 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Zaki Brahmi
    • 1
  • Amine Lini
    • 1
  • Mohamed Mohsen Gammoudi
    • 1
  1. 1.Laboratory RIADIUniversity of ManoubaManoubaTunisia

Personalised recommendations