Skip to main content

A Secure Route Structure for Information Gathering Agent

  • Conference paper
  • First Online:
Book cover Design and Applications of Intelligent Agents (PRIMA 2000)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 1881))

Included in the following conference series:

Abstract

Mobile agents are more likely to be launched over the Internet to collect information. However, an autonomous agent running on a host may suffer attacks if the host is malicious. Possible targets of attacks include: the collected information or the agent itself, including its route. In this paper, we propose a new secure route structure, which provides enhanced security and robust solution to protect an agent’s route. Besides security and robustness, the solution also offers features such as: flexibility in routing and high performance. In addition, we highlight areas where we can apply agents to collect information, with the use of the secure route structure: electronic commerce and intrusion detection system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Wooldridge and N.R Jennings. Intelligent Agents: Theory and Practice. Knowledge Engineering Review 10(2), 1995.

    Google Scholar 

  2. G. Vigna (Ed.). Mobile Agents and Security. Springer Verlag, LNCS 1419, 1998.

    Google Scholar 

  3. K. Rothermel and M. Strasser. A Fault-tolerant Protocol for Providing the Exactly-once Property of Mobile Agents. Proceedings of the Seventeenth IEEE Symposium on Reliable Distributed Systems, 1998.

    Google Scholar 

  4. D. Westhoff, M. Schneider, C. Unger and F. Kenderali. Methods for Protecting a Mobile Agent’s Route. Proceedings of the Second International Information Security Workshop, (ISW’99), 1999. Springer Verlag, LNCS 1729, 1999.

    Google Scholar 

  5. M. Dalmeijer, E. Rietjens, D. Hammer, A. Aerts and M. Soede. A Reliable Mobile Agents Architecture. Proceedings of the First International Symposium on Object-Oriented Real-time Distributed Computing, (ISORC 98), 1998.

    Google Scholar 

  6. H. Maass. Location-aware Mobile Applications Based on Directory Services. Mobile Networks and Applications 3(1998), Baltzer Science Publishers BV, 1998.

    Google Scholar 

  7. W. Van Belle, K. Verelst and T. D’Hondt. Location Transparent Routing in Mobile Agent Systems Merging Name Lookups with Routing. Proceedings of the Seventh IEEE Workshop on Future Trends of Distributed Computing Systems, 1999.

    Google Scholar 

  8. S. Lazar, I. Weerakoon and D. Sidhu. A Scalable Location Tracking and Message Delivery Scheme for Mobile Agents. Proceedings of the Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, (WET ICE’ 98), 1998.

    Google Scholar 

  9. CCITT, Recommendation X.509-1989. The Directory-Authentication Framework. Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva, 1989.

    Google Scholar 

  10. X.F. Wang, X. Yi, K.Y. Lam and E. Okamoto. Secure Information Gathering Agent for Internet Trading. Proceedings of the Eleventh Australian Joint Conference on Artificial Intelligence, Brisbane, Australia, 13 July 1998. Springer Verlag, LNAI 1544, 1998.

    Google Scholar 

  11. J.S. Balasubramaniyan, J.O. Garcia-Fernandez, D. Isacoff, E. Spafford and D. Zam-boni. An Architecture for Intrusion Detection Using Autonomous Agents. Proceedings of the Fourteenth Annual Computer Security Applications Conference, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, T., Seng, C.Y., Lam, K.Y. (2000). A Secure Route Structure for Information Gathering Agent. In: Zhang, C., Soo, VW. (eds) Design and Applications of Intelligent Agents. PRIMA 2000. Lecture Notes in Computer Science(), vol 1881. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44594-3_8

Download citation

  • DOI: https://doi.org/10.1007/3-540-44594-3_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67911-0

  • Online ISBN: 978-3-540-44594-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics