Securing mobile agent and its platform from passive attack of malicious mobile agents

The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. Most of the existing work deals with the protection of mobile agent from malicious host or protecting the host from malicious agents. The issue of protecting a mobile agent from a malicious agent in the host's agent execution environment is not given much attention. Further, for applications like secure data transaction, it is an essential criterion to protect the retrieved data and the address of dynamically selected remote servers. This paper provides an environment that protects the legitimate mobile agent from the malicious mobile agent that performs passive attacks like eavesdropping. To ensure the confidentiality of the data that are retrieved from each remote server a serial encryption technique is implemented. The remote server's address that is selected dynamically is also secured to face the possible eavesdropping threat. The three dimensional security scheme presented in this paper for free-roaming mobile agent addresses the code, data and itinerary security issues.

[1]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[2]  Vijay Varadharajan,et al.  Security and trust enhanced mobile agent based system design , 2005, Third International Conference on Information Technology and Applications (ICITA'05).

[3]  Wayne A. Jansen,et al.  Countermeasures for mobile agent security , 2000, Comput. Commun..

[4]  Sead Muftic,et al.  MagicNET: Security System for Development, Validation and Adoption of Mobile Agents , 2009, 2009 Third International Conference on Network and System Security.

[5]  Abolfazl Esfandi,et al.  Mobile agent security in multi agent environments using a multi agent-multi key approach , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[6]  Sead Muftic,et al.  MagicNET: Security System for Protection of Mobile Agents , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[7]  Bo Sun,et al.  Security of mobile agent in ad hoc network using threshold cryptography , 2010 .

[8]  Akinwale Adio Taofiki,et al.  A Reliable Protection Architecture for Mobile Agents in Open Network Systems , 2011 .

[9]  Xiaoping Wu,et al.  A Trusted Computing Technology Enabled Mobile Agent System , 2008, 2008 International Conference on Computer Science and Software Engineering.

[10]  Yi Zhang,et al.  Key Management and Authentication in Ad Hoc Network based on Mobile Agent , 2009, J. Networks.

[11]  J. M. Gnanasekar,et al.  Distributed Cryptographic Key Management for Mobile Agent Security , 2009 .

[12]  Tarig Mohamed Ahmed Using Secure-Image Mechanism to Protect Mobile Agent Against Malicious Hosts , 2009 .