Skip to main content

Evaluating Mobile Agent Platform Security

  • Conference paper
Multiagent System Technologies (MATES 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4196))

Included in the following conference series:

  • 332 Accesses

Abstract

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed to assess agent platform security. These tests focus on malicious agents trying to attack other agents or the agency. Currently, they have been carried out for two agent platforms: JADE and SeMoA. These tests show which of the known theoretical security problems are relevant in practice. Furthermore, they reveal how these problems were addressed by the respective platform and what security flaws are present.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Braun, P., Rossak, W.: Mobile Agents. Basic Concepts, Mobility Models & the Tracy Toolkit. dpunkt.verlag (2005)

    Google Scholar 

  2. Karmouch, A., Magedanz, T., Delgado, J. (eds.) MATA 2002. LNCS, vol. 2521. Springer, Heidelberg (2002)

    Google Scholar 

  3. Yang, K., Galis, A., Guo, X., Liu, D.: Rule-Driven Mobile Intelligent Agents for Real-Time Configuration of IP Networks. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2773, pp. 921–928. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Fok, C., Roman, G., Lu, C.: Mobile Agent Middleware for Sensor Networks: An Application Case Study. In: Proc. of Fourth Int. Symposium on Information Processing in Sensor Networks, IEEE CNF 2005, pp. 382–387 (2005)

    Google Scholar 

  5. Brewington, B., Gray, R., Moizumi, K., Kotz, D., Cybenko, G., Rus, D.: Mobile agents in distributed information retrieval. In: Intelligent Information Agents. Springer, Heidelberg (1999)

    Google Scholar 

  6. Thati, P., Chang, P., Agha, G.: Crawlets: Agents for high performance web search engine. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, pp. 119–134. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  7. Geirland, J.: The Feature: Mobile Intelligent Agents (2002), http://www.thefeature.com/article?articleid=26051

  8. Gray, R., Kotz, D., Cybenko, G., Rus, D.: D’Agents: Security in a Multiple-Language, Mobile-Agent System. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Jansen, W., Karygiannis, T.: Mobile Agent Security. Special Publication. NIST, pp. 800–819 (1999)

    Google Scholar 

  10. Roth, V.: Programming Satan’s Agents. In: Fischer, K., Hutter, D. (eds.) Proc. of the 1st Int. Workshop on Secure Mobile Multi-Agent Systems, SEMAS 2001. Elsevier, Amsterdam (2002)

    Google Scholar 

  11. Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Jansen, W.: A Privilege Management Scheme for Mobile Agent Systems. In: SEMAS 2001, First International Workshop on Security of Mobile Multiagent Systems. Electronic Notes in Theoretical Computer Science, vol. 63 (2002)

    Google Scholar 

  13. Tschudin, C.: Mobile Agent Security. In: Klusch, M. (ed.) Intelligent information agents: agent based information discovery and management in the Internet, ch. 18. Springer, Heidelberg (1999)

    Google Scholar 

  14. Vigna, G.: Protecting Mobile Agents Through Tracing. In: Proc. of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvalskyla, Finland (1997)

    Google Scholar 

  15. Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: JADE - A White Paper (2003), http://jade.tilab.com

  16. SeMoA (2006), http://www.semoa.org

  17. Santana Torrellas, G.: A Network Security Architectural Approach for Systems Integrity using Multi Agent Systems Engineering. In: Int. Symposium on Parallel Architectures, Algorithms and Networks (ISPAN) (2004)

    Google Scholar 

  18. Borselius, N.: Mobile Agent Security. Electronics & Communication Engineering Journal (2002)

    Google Scholar 

  19. JADE Board: JADE Security Guide (2005), http://jade.tilab.com

  20. Cortese, E., Caire, G., Bochicchio, R.: JADE Test Suite User Guide (2004), http://jade.tilab.com

  21. Roth, V., Jalali, M., Pinsdorf, U.: Secure Mobile Agents (SeMoA) (2006), http://www.inigraphics.net/press/brochures/sec_broch/sec/Security.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bürkle, A., Hertel, A., Müller, W., Wieser, M. (2006). Evaluating Mobile Agent Platform Security. In: Fischer, K., Timm, I.J., André, E., Zhong, N. (eds) Multiagent System Technologies. MATES 2006. Lecture Notes in Computer Science(), vol 4196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11872283_14

Download citation

  • DOI: https://doi.org/10.1007/11872283_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45376-5

  • Online ISBN: 978-3-540-46057-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics