Abstract
Mobile agent systems present a good solution to implement applications that, for a long time, have used client/server architecture. However, this technology is confronted with security threats from agents and hosts. This paper presents a protocol which protects mobile agents from malicious hosts. This protocol is sufficiently robust so that it is durable and fault tolerant.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
El Rhazi, A., Pierre, S., Boucheneb, H.: Secure Protocol in Mobile Agent Environments. International Journal on Mobile Information Systems (to appear)
Allée, G., Pierre, S., Glitho, R.H.: An Improved Itinerary Recording Protocol for Securing Distributed Architectures Based on Mobile Agents. International Journal on Mobile Information Systems (to appear)
Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)
Vigna, G.: Cryptographic Traces for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 137–153. Springer, Heidelberg (1998)
Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Issues and Requirements. In: Proceedings of the 19th National Information Systems Security Conference, pp. 591–597 (October 1996)
Hohl, F.: Time Limited Blackbox Security: Protection of Mobile Agent from Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)
Hohl, F.: A Framework to Protect Mobile Agents by Using Reference States. In: Proceedings 20th International Conference on Distributed Computing Systems, California, pp. 410–417. IEEE Computer Society, Los Alamitos (2000)
Institute for Applied Information, The IAIK Java Cryptography Extension (IAIK-JCE) 3.03, in Processing and Communication of the Technical University Graz (2002), Online documentation, http://jce.iaik.tugraz.at/products/01_jce/documentation/javadoc/
IKV++, Grasshopper, Release 2.2, Basics and Concepts (Revision 1.0) (March 2001)
http://www.softwareresearch.net/site/teaching/SS2004/MC/BasicsAndConcepts2.2.pdf
Jansen, W.A., Karygiannis, T.: Mobile Agent Security, in NIST Special Publication 800-19, National Institute of Standards and Technology (August 1999)
Jansen, W.A.: Countermeasures for mobile agent security. In: Computer Communications, Special Issue on Advanced Security Techniques for Network Protection (November 2000)
Karnik, N.M., Tripathi, A.R.: A Security Architecture for Mobile Agents in Ajanta. In: Proceedings 20th International Conference on Distributed Computing Systems, Los Alamitos, pp. 402–409. IEEE Computer Society, California (2000)
Bierman, E., Cloete, E.: Classification of Malicious Host Threats in Mobile Agent Computing. In: Proceeding of the 2002 annual research conference of the South Africa Institute of Computers Scientists and Information Technologists on Enablement through Technology (SAICSIT 2002), September 16-18, pp. 141–148 (2002)
Roth, V.: Mutual Protection of Co-Operating Agents. In: Vitek, Jensen (eds.) Secure Internet Programming, pp. 26–37. Springer, Heidelberg (1998)
Minsky, Y., Van Renesse, R., Scheinder, F., Stoller, S.: Cryptographic Support for Fault-Tolerant Distributed Computing. In: Proceeding of the 17th ACM SIGOPS, European Workshop, pp. 109–114 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ouardani, A., Pierre, S., Boucheneb, H. (2005). A Secure Protocol for Mobile Agents in Hostile Environment. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I. (eds) Mobility Aware Technologies and Applications. MATA 2005. Lecture Notes in Computer Science, vol 3744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11569510_19
Download citation
DOI: https://doi.org/10.1007/11569510_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29410-8
Online ISBN: 978-3-540-32031-9
eBook Packages: Computer ScienceComputer Science (R0)