A secure modular mobile agent system

Applications in mobile multi-agent systems require a high degree of confidence that code that runs inside the system will not be malicious and that any agents which are malicious can be identified and contained. Since the inception of mobile agents, this threat has been addressed using a multitude of techniques, but many of these implementations have only addressed concerns from the position of either the platform or the agent, and very few approaches have undertaken the problem of mobile agent security from both perspectives simultaneously. Furthermore, no middleware exists that facilitates provision of the required security qualities of mobile agent software while extensively focusing on easing the software development burden. In this paper, we introduce a mobile agent system that enhances security functionality by integrating core software and hardware assurance qualities, as well as addressing security concerns from the perspectives of both the platform and the agent.

[1]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[2]  William M. Farmer,et al.  Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.

[3]  Fritz Hohl,et al.  A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[4]  Christine Julien,et al.  Adaptive Access Control in Coordination-Based Mobile Agent Systems , 2004, SELMAS.

[5]  Arkady B. Zaslavsky,et al.  Countering security vulnerabilities in agent execution using a self executing security examination , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[6]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[7]  Chenyang Lu,et al.  Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).

[8]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[9]  Lori L. Pollock,et al.  A framework for tamper detection marking of mobile applications , 2003, 14th International Symposium on Software Reliability Engineering, 2003. ISSRE 2003..

[10]  Volker Roth Obstacles to the adoption of mobile agents , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[11]  S. Hailes,et al.  ADAM: An Agent-based Middleware Architecture for Distributed Access Control , 2004 .

[12]  Paulo Marques,et al.  Security architecture of the M&M mobile agent framework , 2001, ITCom.

[13]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[14]  Franco Zambonelli,et al.  MARS: A Programmable Coordination Architecture for Mobile Agents , 2000, IEEE Internet Comput..

[15]  Jeffrey M. Bradshaw,et al.  NOMADS: toward a strong and safe mobile agent system , 2000, AGENTS '00.