Skip to main content

Securing Mobile Agents, Stationary Agents and Places in Mobile Agents Systems

  • Conference paper
  • First Online:
Agents and Multi-Agent Systems: Technologies and Applications 2018 (KES-AMSTA-18 2018)

Abstract

A challenging problem to solve to take full advantage of the benefits of mobile agent (MA) technology is to overcome security problems. In fact, in most cases, the security aspects are taken into account on the implementation stage of software development process, which may lead to the negligence of several aspects of security. However, including security properties in the design stage could lead to the development of a more secure MA system, especially that current MA platforms do not cover all security criteria. In this paper, we present a detailed modelling of security properties related to the security of mobile agents, stationary agents and places. The proposed model allows taking into account the security aspect earlier on the software development process and also it can be a first step to help researchers ameliorating security level on MA platforms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mouratidis, H., Giorgini, P., Manson, G.: Modelling secure multiagent systems. In: AAMAS 2003 Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, Melbourne, Australia, 14–18 July 2003

    Google Scholar 

  2. Samet, D., Ktata, F.B., Ghedira, K.: Security and trust on mobile agent platforms: a survey. In: KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, Vilamoura, Portugal (2017)

    Google Scholar 

  3. Jansen, W., Karygiannis, T.: Mobile Agent Security. NiST Special Publication 800-19 (2000)

    Google Scholar 

  4. Alfalayleh, M., Brankovic, L.: An overview of security issues and techniques in mobile agents. In: Conference on Communications and Multimedia Security. University of Newcastle, Australia (2004)

    Google Scholar 

  5. Hachicha, H., Samet, D., Ghedira, K.: A conceptual approach to place security in systems of mobile agents. In: 13th German Conference, MATES 2015, Cottbus, Germany, 28–30 September 2015

    Google Scholar 

  6. Loulou, M., Jmaiel, M., Hadj Kacem, A., Mosbah, M.: A conceptual model for secure mobile agent systems. In: International Conference on Computational Intelligence and Security, Guangzhou, China (2006)

    Google Scholar 

  7. Ma, L., Tsai, J.: Formal modeling and analysis of a secure mobile-agent system. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 38(1), 180–196 (2008)

    Article  Google Scholar 

  8. Rekik, M., Kallel, S., Loulou, M., Hadj Kacem, A.: Modeling secure mobile agent systems. In: KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, Dubrovnik, Croatia (2012)

    Chapter  Google Scholar 

  9. Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285–309 (2007)

    Article  Google Scholar 

  10. Huget, M.-P.: Nemo: an agent-oriented software engineering methodology. In: OOPSLA Workshop on Agent Oriented Methodologies, Seattle (2002)

    Google Scholar 

  11. Jürjens, J.: UMLsec: extending UML for secure systems development. In: International Conference on the Unified Modeling Language, Dresden, Germany (2002)

    Chapter  Google Scholar 

  12. Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: International Conference on the Unified Modeling Language, Dresden, Germany (2002)

    Chapter  Google Scholar 

  13. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE J. Mag. 29(2), 38–47 (1996)

    Google Scholar 

  14. Xiao, L., Peet, A., Lewis, P., Dashmapatra, S., Saez, C., Croitoru, M., Vicente, J., Gonzalez-Velez, H., Ariet, M.L.I.: An adaptive security model for multi-agent systems and application to a clinical trials environment. In: IEEE Annual International Computer Software and Applications Conference Volume II, pp. 261–268. IEEE Computer Society (2007)

    Google Scholar 

  15. Beydoun, G., Low, G.C., Mouratidis, H., Henderson-Sellers, B.: Modelling MAS_specific security features. In: International Conference on Advanced Information Systems Engineering, Trondheim, Norway (2007)

    Google Scholar 

  16. Beydoun, G., Low, G.C., Mouratidis, H., Henderson-Sellers, B.: A security-aware metamodel for multi-agent systems (MAS). Inf. Softw. Technol. 51(5), 832–845 (2009)

    Article  Google Scholar 

  17. Zrari, C., Hachicha, H., Ghedira, K.: Agent’s security during communication in mobile agents system. In: KES 2015, Singapore (2015)

    Article  Google Scholar 

  18. Hachicha, H., Loukil, A., Ghedira, K.: MA-UML: a conceptual approach for mobile agents’ modelling. Int. J. Agent-Oriented Softw. Eng. 3(2/3), 277–305 (2009)

    Article  Google Scholar 

  19. Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: JADE: a software framework for developing multi-agent applications. Lessons learned. Inf. Softw. Technol. 50(1-2), 10–21 (2008)

    Article  Google Scholar 

  20. Jade Security Guide (2005). http://jade.cselt.it/doc/tutorials/JADE_Security.pdf. Accessed 05 Dec 2017

  21. http://jade.tilab.com/doc/tutorials/PKI_Guide.pdf. Accessed 05 Dec 2017

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Donies Samet .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Samet, D., Ktata, F.B., Ghedira, K. (2019). Securing Mobile Agents, Stationary Agents and Places in Mobile Agents Systems. In: Jezic, G., Chen-Burger, YH., Howlett, R., Jain, L., Vlacic, L., Å perka, R. (eds) Agents and Multi-Agent Systems: Technologies and Applications 2018. KES-AMSTA-18 2018. Smart Innovation, Systems and Technologies, vol 96. Springer, Cham. https://doi.org/10.1007/978-3-319-92031-3_10

Download citation

Publish with us

Policies and ethics