Dynamic Adaptability Using Reflexivity for Mobile Agent Protection

The paradigm of mobile agent provides a promising technology for the development of distributed and open applications. However, one of the main obstacles to widespread adoption of the mobile agent paradigm seems to be security. This paper treats the security of the mobile agent against malicious host attacks. It describes generic mobile agent protection architecture. The proposed approach is based on the dynamic adaptability and adopts the reflexivity as a model of conception and implantation. In order to protect it against behaviour analysis attempts, the suggested approach supplies the mobile agent with a flexibility faculty allowing it to present an unexpected behaviour. Furthermore, some classical protective mechanisms are used to reinforce the level of security. Keywords—Dynamic adaptability, malicious host, mobile agent security, reflexivity.

[1]  Steven Guan,et al.  Integrity protection for Code-on-Demand mobile agents in e-commerce , 2002, J. Syst. Softw..

[2]  Munindar P. Singh,et al.  Agents on the Web: Mobile Agents , 1997, IEEE Internet Comput..

[3]  James E. White,et al.  Mobile Agents , 1997, Lecture Notes in Computer Science.

[4]  Niklas Borselius Mobile agent security , 2002 .

[5]  Thomas Ledoux Adaptability in Mobile Agent Systems using Reflection , 2000 .

[6]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[7]  Amal El Fallah Seghrouchni,et al.  Towards a Generic Architecture for Self-Adaptive Mobile Agents , 2005 .

[8]  Helmut Reiser,et al.  Dynamic Adaptation of Mobile Agents in Heterogenous Environments , 2001, Mobile Agents.

[9]  Venansius Baryamureeba,et al.  PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8 , 2005 .

[10]  Paolo Bellavista,et al.  Security for Mobile Agents : Issues and Challenges , 2003 .

[11]  Elsabé Cloete,et al.  Classification of malicious host threats in mobile agent computing , 2002 .

[12]  Eyal de Lara,et al.  Puppeteer: component-based adaptation for mobile computing , 2000, OPSR.

[13]  Levent Ertaul,et al.  Mobile Agent Security , 2006, Security and Management.

[14]  Diomidis Spinellis,et al.  Reflection as a mechanism for software integrity verification , 2000, TSEC.

[15]  Michael J. Grimley,et al.  Protecting the integrity of agents: an exploration into letting agents loose in an unpredictable world , 1999, CROS.