Skip to main content

Anonymity Architecture for Mobile Agent Systems

  • Conference paper
Holonic and Multi-Agent Systems for Manufacturing (HoloMAS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4659))

  • 1350 Accesses

Abstract

The paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the elements of the second module. This part of architecture was implemented and provided to MAS users. Module II instead, is defined in abstract way, through high-level description of its components.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Luck, M., McBurney, P., Preist, C.: Agent Technology: Enabling Next Generation Computing (A Roadmap for Agent Based Computing). AgentLink (January 2003)

    Google Scholar 

  2. Gray, R.S., Kotz, D., Cybenko, G., Rus, D.: Mobile agents: Motivations and state-of-the-art systems. Technical Report TR2000-365, Dartmouth College, Hanover, NH (2000)

    Google Scholar 

  3. Farmer, W.M., Guttman, J.D., Swarup, V.: Security for mobile agents: Issues and requirements (1996)

    Google Scholar 

  4. Jansen, W., Karygiannis, T.: Nist special publication 800-19 - mobile agent security (2000)

    Google Scholar 

  5. National Institute of Standards and Technology (NIST): Common Criteria for Information Technology Security Evaluation - Part 2: Security Funtional Requirements. U.S. Government Printing Office (1998)

    Google Scholar 

  6. Halpern, J.Y., O’Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security (2004)

    Google Scholar 

  7. Gülcü, C., Tsudik, G.: Mixing email with Babel. In: Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS 1996), vol. 2, IEEE Computer Society, Los Alamitos (1996)

    Google Scholar 

  8. Leszczyna, R., Górski, J.: Untraceability of mobile agents. In: Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), New York, vol. 3, pp. 1233–1234. Association for Computing Machinery (ACM) Press, New York (2005)

    Chapter  Google Scholar 

  9. Leszczyna, R.: The solution for anonymous access of it services and its application to e-health counselling. In: Proceedings of the 1st 2005 IEEE International Conference on Technologies for Homeland Security and Safety (TEHOSS 2005) Gdańsk, Poland, Gdańsk University of Technology, pp. 161–170 (September 2005)

    Google Scholar 

  10. Leszczyna, R., Górski, J.: Performance analysis of untraceability protocols for mobile agents using an adaptable framework. In: Stone, P., Weiss, G. (eds.) Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), New York, pp. 1063–1070. Association for Computing Machinery (ACM) Press, New York (2006)

    Chapter  Google Scholar 

  11. Leszczyna, R., Górski, J.: An untraceability protocol for mobile agents and its enhanced security study. In: 15th EICAR Annual Conference Proceedings, Hamburg, Germany, pp. 26–37 (April 29 – May 2, 2006)

    Google Scholar 

  12. Leszczyna, R.: Architecture supporting security of agent systems. PhD thesis, Gdańsk University of Technology, Gdańsk, Poland (June 2006)

    Google Scholar 

  13. Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology (version v0.25). Website (December 2005)

    Google Scholar 

  14. Chess, D., Harrison, C., Kershenbaum, A.: Mobile agents: Are they a good idea? Technical Report RC 19887 (December 21, 1994 - Declassified March 16, 1995), Yorktown Heights, New York (1994)

    Google Scholar 

  15. Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant agents for mobile computing. IEEE Personal Communications 2(5), 34–49 (1995)

    Article  Google Scholar 

  16. Franklin, S., Graesser, A.: Is it an agent, or just a program?: A taxonomy for autonomous agents. In: Jennings, N.R., Wooldridge, M.J., Müller, J.P. (eds.) Intelligent Agents III. Agent Theories, Architectures, and Languages. LNCS, vol. 1193, Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  17. Carzaniga, A., Picco, G.P., Vigna, G.: Designing distributed applications with a mobile code paradigm. In: Proceedings of the 19th International Conference on Software Engineering, Boston, MA (1997)

    Google Scholar 

  18. Fuggetta, A., Picco, G.P., Vigna, G.: Understanding code mobility. IEEE Transactions on Software Engineering 24(5), 342–361 (1998)

    Article  Google Scholar 

  19. Milojicic, D.S.: Trend wars: Mobile agent applications. IEEE Concurrency 7(3), 80–90 (1999)

    Article  Google Scholar 

  20. Yee, B.S.: A sanctuary for mobile agents. In: Proceedings of the DARPA Workshop on Foundations for Secure Mobile Code, Monterey, USA (March 1997)

    Google Scholar 

  21. Leszczyna, R.: Anonymity architecture for mobile agents. Technical report, European Commission, Joint Research Centre, Institute for the Protection and security of the Citizen, Ispra, Italy (April 2006)

    Google Scholar 

  22. Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues and open problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10–29. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  23. Dolev, S., Ostrobsky, R.: Xor-trees for efficient anonymous multicast and reception. ACM Transactions on Information Systems Secururity 3(2), 63–84 (2000)

    Article  Google Scholar 

  24. Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96–114. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  25. Lindell, Y.: Foundations of cryptography 89-856. Electronic document (April 2006)

    Google Scholar 

  26. Foundation for Intelligent Physical Agents (FIPA): Fipa abstract architecture specification (2002)

    Google Scholar 

  27. Karjoth, G., Asokan, N., Gülcü, C.: Protecting the computation results of free-roaming agents. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 195–207. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  28. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 4(2) (1981)

    Google Scholar 

  29. Leszczyna, R.: Untraceability I Add-on for JADE. European Commission, Joint Research Centre, Institute for the Protection and security of the Citizen, Via Enrico Fermi 1, Ispra, Italy. 1 edn. (September 2005)

    Google Scholar 

  30. Bellifemine, F., Caire, G., Trucco, T., Rimassa, G.: Jade programmers guide (February 2003)

    Google Scholar 

  31. Telecom Italia Lab: Java Agent DEvelopment Framework. Website

    Google Scholar 

  32. Sander, T., Tschudin, C.F.: Protecting mobile agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 379–386. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  33. Borselius, N.: Mobile agent security. Electronics & Communication Engineering Journal 14(5), 211–218 (2002)

    Article  Google Scholar 

  34. Kesdogan, D., Egner, J., Büschkes, R.: Stop-and-go MIXes: Providing probabilistic anonymity in an open system. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  35. Meadows, C.: Detecting attacks on mobile agents. In: Proceedings of Foundations for Secure Mobile Code Workshop, Monterey, CA, pp. 64–65 (March 1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vladimír Mařík Valeriy Vyatkin Armando W. Colombo

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Leszczyna, R. (2007). Anonymity Architecture for Mobile Agent Systems. In: Mařík, V., Vyatkin, V., Colombo, A.W. (eds) Holonic and Multi-Agent Systems for Manufacturing. HoloMAS 2007. Lecture Notes in Computer Science(), vol 4659. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74481-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74481-8_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74478-8

  • Online ISBN: 978-3-540-74481-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics