A Survey of E-Business SecurityFor Mobile Multi-Agent Environment

Agent technology is a very emerging field of research. Various classes of agents (e.g. intelligent agents, software agents) have emerged so far. Software Agents including Mobile Agents are useful for Distributed Systems & Electronic Commerce. E-Commerce and M-Commerce can help a company or enterprise to extend its market place to unlimited region. With the increasing market of Electronic Commerce it becomes an interesting aspect to use autonomous Mobile Agents (MAs) for Electronic Business transactions. Since, various components of E-business can be represented by Software Agent/ Mobile Agents it can be viewed as a multiagent environment. To fully deploy agents in multi-agent environment require addressing number of challenging issues like Security, Fault Tolerance, Location Management and Privacy of both agents and executing environment. However, scope of this paper is limited to security of mobile agents in a multi-agent environment for Electronic Business applications. Security is focused mainly on protection and security of agents and its runtime environment, but most of the currently available mobile agent systems do not support comprehensive security requirements for a general Mobile Agents paradigm. Therefore, there is a need for a complete and comprehensive security infrastructure for mobile agents, not only in the form of security services and mechanisms for agents runtime execution, but also as a complete set of infrastructural components along with methodology for creation, classification, adoption, and validation of Mobile agents, before their deployment in realenvironment. This paper studies the various security solutions proposed by researchers for Mobile Agents in Multi Agent environment for Electronic business applications and analyze then on the basis of various parameters such as performance, requirements and complexity.

[1]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[2]  Wayne A. Jansen,et al.  Countermeasures for mobile agent security , 2000, Comput. Commun..

[3]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[4]  Deli Yang,et al.  Research on Mobile Agent-based E-Commerce System Framework , 2004, ICEB.

[5]  Danny B. Lange,et al.  Mobile Objects and Mobile Agents: The Future of Distributed Computing? , 1998, ECOOP.

[6]  Giovanni Pilato,et al.  Biometric Features for Mobile Agents Ownership , 2004 .

[7]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.

[8]  N. Balon Preventing Attacks on Mobile Agents by Malicious Hosts , 2005 .

[9]  Wayne Jansen,et al.  NIST Special Publication 800-19 – Mobile Agent Security , 2000 .

[10]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[11]  G. Glass ObjectSpace Voyager core package technical overview , 1999 .

[12]  Rolf Oppliger Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..

[13]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[14]  Gian Pietro Picco,et al.  Understanding code mobility , 1998, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.

[15]  Paulo Marques,et al.  Security mechanisms for using mobile agents in electronic commerce , 1999, Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.

[16]  Omer Mansoor Paracha A Security Framework for Mobile Agent Systems , 2009 .