Authentication Mechanisms for Mobile Agents

This paper describes authentication mechanisms for mobile agents. In these mechanisms, the authentication of mobile agents is controlled by the mobile-agents platform using digital signature and a public key infrastructure. Agents are authenticated via the authentication of their running platforms. An important advantage of our technique is transparency of the mechanisms and the portability of non-secure applications onto a secure environment. The authentication mechanisms are integrated within the transportation layer of a mobile-agents system. A minimal mobile agent system and the authentication mechanisms have been implemented. The implementation experiments have shown the feasibility and the advantage of these mechanisms

[1]  Joe Kilian,et al.  One-Round Secure Computation and Secure Autonomous Mobile Agents , 2000, ICALP.

[2]  M. Sherif,et al.  Protocols for Secure Electronic Commerce , 2000 .

[3]  Pankaj Kumar J2EE Security for Servlets, EJBs, and Web Services: Applying Theory and Standards to Practice , 2003 .

[4]  Roger Riggs,et al.  Pickling State in the Java System , 1996, Comput. Syst..

[5]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[6]  James A. Gosling,et al.  The java language environment: a white paper , 1995 .

[7]  John Zachary Protecting Mobile Code in the Wild , 2003, IEEE Internet Comput..

[8]  Gregory V. Wilson,et al.  Smart Messages: An Object-Oriented Communication Mechanism for Parallel Systems , 1996, Comput. Syst..

[9]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[10]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[11]  Danny B. Lange,et al.  Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .

[12]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[13]  Giovanni Vigna,et al.  Protecting Mobile Agents through Tracing , 1997 .

[14]  William Stallings,et al.  Cryptography and network security , 1998 .

[15]  N. Asokan,et al.  Protecting the computation results of free-roaming agents , 2005, Personal Technologies.

[16]  Matt Bishop,et al.  Computer Security: Art and Science , 2002 .

[17]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[18]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.

[19]  Scott Oaks,et al.  Java Security , 1998 .