Towards a Security Solution for Mobile Agents
The current distributed systems are mainly based on the client – server model. The growing use of the Internet and the development of information and communication technologies has yielded more needs in terms of performance, reliability and security of information. By its synchronous nature, the client – server model no longer seems able to meet these new demands. Several new approaches have been proposed, for example the mobility of the code, involving the emergence of the mobile agents’ paradigm (MA). This paradigm certainly holds great promise, though questions of security arise. In this paper, we propose an extension of the MA model called Seller – Buyer model (SB). This extension is made by making the server component mobile and using market mechanisms between the client agent (the buyer) and the server agent (the seller). While most of works in the area propose asymmetric security solutions, the SB model proposes a symmetric security approach for the MA. The SB model will give the developers a way to use, safely and efficiently, MA to build distributed applications on large-scale networks such as the Internet.
KeywordsMobile Agent (MA) Seller-Buyer model Distributed systems Security
Unable to display preview. Download preview PDF.
- 1.Arbaugh, B., Farber, D., Smith, J.: A secure and reliable bootstrap architecture. Paper presented at the IEEE Symposium on Security and Privacy (1997)Google Scholar
- 2.ASDK. IBM Aglets Software Development Kit Homepage, http://www.trl.ibm.co.jp/aglets (accessed in July 2010)
- 3.Chan, A.H.W., Wong, C.K.M., Wong, T.Y., Lyu, M.R.: Securing Mobile Agents for Electronic Commerce: an Experiment. In: Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures. Kluwer, B.V. Deventer (2000)Google Scholar
- 5.FIPA, Official site of the Foundation for Intelligent Physical Agents (2009), Obtained through the Internet: http://www.fipa.org (accessed June 15, 2009)
- 8.Gulyás, L., Kovács, L., Micsik, A., Pataki, B., Zsámboki, I.: An Overview of Mobile Software Systems. MTA SZTAKI Technical Report. Department of Distributed Systems, MTA SZTAKI, Computer and Automation Research Institute of the Hungarian Academy of Sciences (2001)Google Scholar
- 9.Harrison, C.G., Chess, D.M., Kershenbaum, A.: Mobile Agents: Are they a good idea? IBM T.J. Watson Research Report. RC 19887 (1995)Google Scholar
- 10.Jansen, W., Mell, P., Marks, D., Karygiannis, T.: Mobile agent security. National Institute of Standards and Technology (NIST) Special Publication – 800-19, Gaithersburg, MD 20899, USA (October 1999)Google Scholar
- 13.Milojicic, D., Breugst, M., Busse, I., Campbell, J., Covaci, S., Friedman, B., Kosaka, K., Lange, D., Ono, K., Oshima, M., Tham, C., Virdhagriswaran, S., White, J.: MASIF: The OMG Mobile Agent System Interoperability Facility. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 50–67. Springer, Heidelberg (1998)CrossRefGoogle Scholar
- 14.Papaioannou, T.: Mobile Agents: Are They Useful for Establishing a Virtual Presence in Space? In: Agents with Adjustable Autonomy Symposium, Part of the AAAI 1999. Spring Symposium Series (1999)Google Scholar
- 16.Rouvrais, S.: Construction de services distribués: une approche à base d’agents mobiles. TSI-HERMES / RSTI – TSI 21(7), 985–1007 (2002)Google Scholar
- 18.Tschudin, C.: Mobile Agent Security. In: Intelligent Information Agent: Agent Based Information Discovery and Management in the Internet, pp. 431–446 (1999)Google Scholar