Promoting the development of secure mobile agent applications

In this paper, we present a software architecture and a development environment for the implementation of applications based on secure mobile agents. Recent breakthroughs in mobile agent security have unblocked this technology, but there is still one important issue to overcome: the complexity of programming applications using these security solutions. Our proposal aims to facilitate and speed up the process of implementing cryptographic protocols, and to allow the reuse of these protocols for the development of secure mobile agents. As a result, the proposed architecture and development environment promote the use of mobile agent technology for the implementation of secure distributed applications.

[1]  Fritz Hohl A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.

[2]  Samuel Pierre,et al.  A security protocol for mobile agents based upon the cooperation of sedentary agents , 2007, J. Netw. Comput. Appl..

[3]  David D. Langan,et al.  A pattern-based development tool for mobile agents , 2005, SIGCSE.

[4]  Yasushi Kambayashi,et al.  A Functional Language for Mobile Agents with Dynamic Extension , 2004, KES.

[5]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[6]  Giovanni Vigna,et al.  Protecting Mobile Agents through Tracing , 1997 .

[7]  Robert Wahbe,et al.  Efficient software-based fault isolation , 1994, SOSP '93.

[8]  D. Lessner Computer Science Education on High Schools , 2010 .

[9]  Javier López,et al.  Analysis of a free roaming agent result-truncation defense scheme , 2004, Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004..

[10]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[11]  David D. Langan,et al.  A pattern-based development tool for mobile agents , 2005 .

[12]  Joan Borrell,et al.  Protecting Mobile Agent Itineraries , 2003, MATA.

[13]  Agostino Poggi,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[14]  Vasant Honavar,et al.  Towards the automatic generation of mobile agents for distributed intrusion detection system , 2006, J. Syst. Softw..

[15]  Doug Baldwin,et al.  Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2005, St. Louis, Missouri, USA, February 23-27, 2005 , 2005, SIGCSE.

[16]  Carles Garrigues,et al.  Protecting mobile agents from external replay attacks , 2009, J. Syst. Softw..

[17]  Sergi Robles,et al.  Self-protected mobile agents , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[18]  Tainchi Lu,et al.  Mobile agents for information retrieval in hybrid simulation environment , 2007, J. Netw. Comput. Appl..

[19]  Riccardo Sisto,et al.  A configurable mobile agent data protection protocol , 2003, AAMAS '03.

[20]  Bennet S. Yee,et al.  Using Secure Coprocessors , 1994 .

[21]  Fabio Bellifemine,et al.  Developing Multi-Agent Systems with JADE (Wiley Series in Agent Technology) , 2007 .

[22]  Jorge C. A. de Figueiredo,et al.  An approach to modelling and applying mobile agent design patterns , 2004, SOEN.

[23]  William M. Farmer,et al.  Security for Mobile Agents: Issues and Requirements , 1996 .

[24]  Marcelo R. Campo,et al.  Simplifying Mobile Agent Development through Reactive Mobility by Failure , 2002, SBIA.

[25]  S. Ilarri,et al.  Comparison and Performance Evaluation of Mobile Agent Platforms , 2007, Third International Conference on Autonomic and Autonomous Systems (ICAS'07).

[26]  Damianos Gavalas,et al.  A mobile agent platform for distributed network and systems management , 2009, Journal of Systems and Software.

[27]  Qusay H. Mahmoud,et al.  Making Software Agents User-Friendly , 2006, Computer.

[28]  Akihiko Ohsuga,et al.  Mobile agent security with the IPEditor development tool and the mobile UNITY language , 2001, AGENTS '01.

[29]  Volker Roth,et al.  Empowering Mobile Software Agents , 2002, Mobile Agents.

[30]  Michael Luck,et al.  AAMAS '03: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems , 2003 .

[31]  Carles Garrigues Olivella,et al.  Securing dynamic itineraries for mobile agent applications , 2008 .

[32]  Akihiko Ohsuga,et al.  Agent system development method based on agent patterns , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).

[33]  Volker Roth,et al.  Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.

[34]  Rami Bahsoon,et al.  Requirements for Evaluating Architectural Stability , 2006, IEEE International Conference on Computer Systems and Applications, 2006..

[35]  Helen D. Karatza,et al.  Brute force web search for wireless devices using mobile agents , 2004, J. Syst. Softw..