Detection of Mobile Agent's Blocking in Secure Layered Architecture

with the exponential growth of distributed applications and widespread popularity of Internet poses many challenges for researchers that motivate the organizations to deploy the mobile agent technology with considering the security issue pertains to mobile agent and agent platform. Malicious host problem is one of the biggest challenging issues in the arena of agent technology. Current proposal aims to layered security model for the protection of agent's code, data and secrets which are worth mentioning in a single approach along with maintaining autonomy features of mobile agents. The proposed defense in depth approach is viable under the assumption of established PKI (Public Key infrastructure) with fixed ordered itinerary list of nodes. In addition, we devise an algorithm for detecting the culprit of blocking attack to rescue the offers (data) collected during the agent's itinerary.

[1]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[2]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[3]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[4]  Wayne Jansen,et al.  NIST Special Publication 800-19 – Mobile Agent Security , 2000 .

[5]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[6]  Moti Yung,et al.  Sliding Encryption: A Cryptographic Tool for Mobile Agents , 1997, FSE.

[7]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[8]  Jianying Zhou,et al.  Protecting mobile-agent data collection against blocking attacks , 2006, Comput. Stand. Interfaces.

[9]  W. A. Jansen,et al.  MOBILE AGENTS AND SECURITY , 1999 .

[10]  Giovanni Vigna,et al.  Protecting Mobile Agents through Tracing , 1997 .

[11]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[12]  Niklas Borselius Mobile agent security , 2002 .

[13]  Jan Vitek,et al.  Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .

[14]  Volker Roth,et al.  Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.

[15]  Fritz Hohl An Approach to Solve the Problem of Malicious Hosts , 1998 .

[16]  Jim Alves-Foss,et al.  The use of encrypted functions for mobile agent security , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.