Skip to main content

A Secure Protocol for Mobile Agents in Hostile Environment

  • Conference paper
Mobility Aware Technologies and Applications (MATA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3744))

  • 518 Accesses

Abstract

Mobile agent systems present a good solution to implement applications that, for a long time, have used client/server architecture. However, this technology is confronted with security threats from agents and hosts. This paper presents a protocol which protects mobile agents from malicious hosts. This protocol is sufficiently robust so that it is durable and fault tolerant.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. El Rhazi, A., Pierre, S., Boucheneb, H.: Secure Protocol in Mobile Agent Environments. International Journal on Mobile Information Systems (to appear)

    Google Scholar 

  2. Allée, G., Pierre, S., Glitho, R.H.: An Improved Itinerary Recording Protocol for Securing Distributed Architectures Based on Mobile Agents. International Journal on Mobile Information Systems (to appear)

    Google Scholar 

  3. Sander, T., Tschudin, C.F.: Protecting Mobile Agents Against Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 44–60. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Vigna, G.: Cryptographic Traces for Mobile Agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 137–153. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  5. Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Issues and Requirements. In: Proceedings of the 19th National Information Systems Security Conference, pp. 591–597 (October 1996)

    Google Scholar 

  6. Hohl, F.: Time Limited Blackbox Security: Protection of Mobile Agent from Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Hohl, F.: A Framework to Protect Mobile Agents by Using Reference States. In: Proceedings 20th International Conference on Distributed Computing Systems, California, pp. 410–417. IEEE Computer Society, Los Alamitos (2000)

    Google Scholar 

  8. Institute for Applied Information, The IAIK Java Cryptography Extension (IAIK-JCE) 3.03, in Processing and Communication of the Technical University Graz (2002), Online documentation, http://jce.iaik.tugraz.at/products/01_jce/documentation/javadoc/

  9. IKV++, Grasshopper, Release 2.2, Basics and Concepts (Revision 1.0) (March 2001)

    Google Scholar 

  10. http://www.softwareresearch.net/site/teaching/SS2004/MC/BasicsAndConcepts2.2.pdf

  11. Jansen, W.A., Karygiannis, T.: Mobile Agent Security, in NIST Special Publication 800-19, National Institute of Standards and Technology (August 1999)

    Google Scholar 

  12. Jansen, W.A.: Countermeasures for mobile agent security. In: Computer Communications, Special Issue on Advanced Security Techniques for Network Protection (November 2000)

    Google Scholar 

  13. Karnik, N.M., Tripathi, A.R.: A Security Architecture for Mobile Agents in Ajanta. In: Proceedings 20th International Conference on Distributed Computing Systems, Los Alamitos, pp. 402–409. IEEE Computer Society, California (2000)

    Google Scholar 

  14. Bierman, E., Cloete, E.: Classification of Malicious Host Threats in Mobile Agent Computing. In: Proceeding of the 2002 annual research conference of the South Africa Institute of Computers Scientists and Information Technologists on Enablement through Technology (SAICSIT 2002), September 16-18, pp. 141–148 (2002)

    Google Scholar 

  15. Roth, V.: Mutual Protection of Co-Operating Agents. In: Vitek, Jensen (eds.) Secure Internet Programming, pp. 26–37. Springer, Heidelberg (1998)

    Google Scholar 

  16. Minsky, Y., Van Renesse, R., Scheinder, F., Stoller, S.: Cryptographic Support for Fault-Tolerant Distributed Computing. In: Proceeding of the 17th ACM SIGOPS, European Workshop, pp. 109–114 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ouardani, A., Pierre, S., Boucheneb, H. (2005). A Secure Protocol for Mobile Agents in Hostile Environment. In: Magedanz, T., Karmouch, A., Pierre, S., Venieris, I. (eds) Mobility Aware Technologies and Applications. MATA 2005. Lecture Notes in Computer Science, vol 3744. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11569510_19

Download citation

  • DOI: https://doi.org/10.1007/11569510_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29410-8

  • Online ISBN: 978-3-540-32031-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics