Abstract
Mobile agents are more likely to be launched over the Internet to collect information. However, an autonomous agent running on a host may suffer attacks if the host is malicious. Possible targets of attacks include: the collected information or the agent itself, including its route. In this paper, we propose a new secure route structure, which provides enhanced security and robust solution to protect an agent’s route. Besides security and robustness, the solution also offers features such as: flexibility in routing and high performance. In addition, we highlight areas where we can apply agents to collect information, with the use of the secure route structure: electronic commerce and intrusion detection system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Wooldridge and N.R Jennings. Intelligent Agents: Theory and Practice. Knowledge Engineering Review 10(2), 1995.
G. Vigna (Ed.). Mobile Agents and Security. Springer Verlag, LNCS 1419, 1998.
K. Rothermel and M. Strasser. A Fault-tolerant Protocol for Providing the Exactly-once Property of Mobile Agents. Proceedings of the Seventeenth IEEE Symposium on Reliable Distributed Systems, 1998.
D. Westhoff, M. Schneider, C. Unger and F. Kenderali. Methods for Protecting a Mobile Agent’s Route. Proceedings of the Second International Information Security Workshop, (ISW’99), 1999. Springer Verlag, LNCS 1729, 1999.
M. Dalmeijer, E. Rietjens, D. Hammer, A. Aerts and M. Soede. A Reliable Mobile Agents Architecture. Proceedings of the First International Symposium on Object-Oriented Real-time Distributed Computing, (ISORC 98), 1998.
H. Maass. Location-aware Mobile Applications Based on Directory Services. Mobile Networks and Applications 3(1998), Baltzer Science Publishers BV, 1998.
W. Van Belle, K. Verelst and T. D’Hondt. Location Transparent Routing in Mobile Agent Systems Merging Name Lookups with Routing. Proceedings of the Seventh IEEE Workshop on Future Trends of Distributed Computing Systems, 1999.
S. Lazar, I. Weerakoon and D. Sidhu. A Scalable Location Tracking and Message Delivery Scheme for Mobile Agents. Proceedings of the Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, (WET ICE’ 98), 1998.
CCITT, Recommendation X.509-1989. The Directory-Authentication Framework. Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva, 1989.
X.F. Wang, X. Yi, K.Y. Lam and E. Okamoto. Secure Information Gathering Agent for Internet Trading. Proceedings of the Eleventh Australian Joint Conference on Artificial Intelligence, Brisbane, Australia, 13 July 1998. Springer Verlag, LNAI 1544, 1998.
J.S. Balasubramaniyan, J.O. Garcia-Fernandez, D. Isacoff, E. Spafford and D. Zam-boni. An Architecture for Intrusion Detection Using Autonomous Agents. Proceedings of the Fourteenth Annual Computer Security Applications Conference, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, T., Seng, C.Y., Lam, K.Y. (2000). A Secure Route Structure for Information Gathering Agent. In: Zhang, C., Soo, VW. (eds) Design and Applications of Intelligent Agents. PRIMA 2000. Lecture Notes in Computer Science(), vol 1881. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44594-3_8
Download citation
DOI: https://doi.org/10.1007/3-540-44594-3_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67911-0
Online ISBN: 978-3-540-44594-4
eBook Packages: Springer Book Archive