Abstract
The paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the elements of the second module. This part of architecture was implemented and provided to MAS users. Module II instead, is defined in abstract way, through high-level description of its components.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Luck, M., McBurney, P., Preist, C.: Agent Technology: Enabling Next Generation Computing (A Roadmap for Agent Based Computing). AgentLink (January 2003)
Gray, R.S., Kotz, D., Cybenko, G., Rus, D.: Mobile agents: Motivations and state-of-the-art systems. Technical Report TR2000-365, Dartmouth College, Hanover, NH (2000)
Farmer, W.M., Guttman, J.D., Swarup, V.: Security for mobile agents: Issues and requirements (1996)
Jansen, W., Karygiannis, T.: Nist special publication 800-19 - mobile agent security (2000)
National Institute of Standards and Technology (NIST): Common Criteria for Information Technology Security Evaluation - Part 2: Security Funtional Requirements. U.S. Government Printing Office (1998)
Halpern, J.Y., O’Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security (2004)
Gülcü, C., Tsudik, G.: Mixing email with Babel. In: Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS 1996), vol. 2, IEEE Computer Society, Los Alamitos (1996)
Leszczyna, R., Górski, J.: Untraceability of mobile agents. In: Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), New York, vol. 3, pp. 1233–1234. Association for Computing Machinery (ACM) Press, New York (2005)
Leszczyna, R.: The solution for anonymous access of it services and its application to e-health counselling. In: Proceedings of the 1st 2005 IEEE International Conference on Technologies for Homeland Security and Safety (TEHOSS 2005) Gdańsk, Poland, Gdańsk University of Technology, pp. 161–170 (September 2005)
Leszczyna, R., Górski, J.: Performance analysis of untraceability protocols for mobile agents using an adaptable framework. In: Stone, P., Weiss, G. (eds.) Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), New York, pp. 1063–1070. Association for Computing Machinery (ACM) Press, New York (2006)
Leszczyna, R., Górski, J.: An untraceability protocol for mobile agents and its enhanced security study. In: 15th EICAR Annual Conference Proceedings, Hamburg, Germany, pp. 26–37 (April 29 – May 2, 2006)
Leszczyna, R.: Architecture supporting security of agent systems. PhD thesis, Gdańsk University of Technology, Gdańsk, Poland (June 2006)
Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology (version v0.25). Website (December 2005)
Chess, D., Harrison, C., Kershenbaum, A.: Mobile agents: Are they a good idea? Technical Report RC 19887 (December 21, 1994 - Declassified March 16, 1995), Yorktown Heights, New York (1994)
Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant agents for mobile computing. IEEE Personal Communications 2(5), 34–49 (1995)
Franklin, S., Graesser, A.: Is it an agent, or just a program?: A taxonomy for autonomous agents. In: Jennings, N.R., Wooldridge, M.J., Müller, J.P. (eds.) Intelligent Agents III. Agent Theories, Architectures, and Languages. LNCS, vol. 1193, Springer, Heidelberg (1997)
Carzaniga, A., Picco, G.P., Vigna, G.: Designing distributed applications with a mobile code paradigm. In: Proceedings of the 19th International Conference on Software Engineering, Boston, MA (1997)
Fuggetta, A., Picco, G.P., Vigna, G.: Understanding code mobility. IEEE Transactions on Software Engineering 24(5), 342–361 (1998)
Milojicic, D.S.: Trend wars: Mobile agent applications. IEEE Concurrency 7(3), 80–90 (1999)
Yee, B.S.: A sanctuary for mobile agents. In: Proceedings of the DARPA Workshop on Foundations for Secure Mobile Code, Monterey, USA (March 1997)
Leszczyna, R.: Anonymity architecture for mobile agents. Technical report, European Commission, Joint Research Centre, Institute for the Protection and security of the Citizen, Ispra, Italy (April 2006)
Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)
Dolev, S., Ostrobsky, R.: Xor-trees for efficient anonymous multicast and reception. ACM Transactions on Information Systems Secururity 3(2), 63–84 (2000)
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96–114. Springer, Heidelberg (2001)
Lindell, Y.: Foundations of cryptography 89-856. Electronic document (April 2006)
Foundation for Intelligent Physical Agents (FIPA): Fipa abstract architecture specification (2002)
Karjoth, G., Asokan, N., Gülcü, C.: Protecting the computation results of free-roaming agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 195–207. Springer, Heidelberg (1998)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (1981)
Leszczyna, R.: Untraceability I Add-on for JADE. European Commission, Joint Research Centre, Institute for the Protection and security of the Citizen, Via Enrico Fermi 1, Ispra, Italy. 1 edn. (September 2005)
Bellifemine, F., Caire, G., Trucco, T., Rimassa, G.: Jade programmers guide (February 2003)
Telecom Italia Lab: Java Agent DEvelopment Framework. Website
Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 379–386. Springer, Heidelberg (1998)
Borselius, N.: Mobile agent security. Electronics & Communication Engineering Journal 14(5), 211–218 (2002)
Kesdogan, D., Egner, J., Büschkes, R.: Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, Springer, Heidelberg (1998)
Meadows, C.: Detecting attacks on mobile agents. In: Proceedings of Foundations for Secure Mobile Code Workshop, Monterey, CA, pp. 64–65 (March 1997)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Leszczyna, R. (2007). Anonymity Architecture for Mobile Agent Systems. In: Mařík, V., Vyatkin, V., Colombo, A.W. (eds) Holonic and Multi-Agent Systems for Manufacturing. HoloMAS 2007. Lecture Notes in Computer Science(), vol 4659. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74481-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-74481-8_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74478-8
Online ISBN: 978-3-540-74481-8
eBook Packages: Computer ScienceComputer Science (R0)