The role of Trusted Computing in secure agent migration

Software agents are a promising computing paradigm. Scientific community has devoted important efforts to this field [1]. Indeed, several important applications exist based on this technology. Despite of their benefits, the lack of the appropriate security mechanisms for agent based systems represents a barrier for the widespread use of this technology. Additionally, the application of the current security techniques is not trivial for agent based system developers, which are usually not security experts. This paper presents a hardware based protection infrastructure that takes advantage of the recent advances in trusted hardware in order to solve the problem known as the malicious host in mobile agent systems. This infrastructure is composed of extensions to the JADE framework and the Trusted Computing technology. Additionally, the protocol used in this implementation has been validated using the Automated Validation of Internet Security Protocols and Applications (AVISPA) as we described in the paper.

[1]  Antonio Maña Protección de software basada en tarjetas inteligentes , 2003 .

[2]  Chen Wang,et al.  Intelligent Agents in the Nuclear Industry , 1997, Computer.

[3]  Jean-Jacques Quisquater,et al.  Robust Object Watermarking: Application to Code , 1999, Information Hiding.

[4]  Ursula M. Schwuttke,et al.  Enhancing Performance of Cooperating Agents in Real-Time Diagnostic Systems , 1993, IJCAI.

[5]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[6]  Daniel Serrano,et al.  SecMiLiA: An Approach in the Agent Protection , 2009, 2009 International Conference on Availability, Reliability and Security.

[7]  Haralambos Mouratidis,et al.  A secure architectural description language for agent systems , 2005, AAMAS '05.

[8]  Antonio Maña,et al.  A Hardware Based Infrastructure for Agent Protection , 2009 .

[9]  Carl A. Gunter,et al.  Infrastructure for Proof-Referencing Code , 1997 .

[10]  Richard R. Brooks,et al.  Mobile code paradigms and security issues , 2004, IEEE Internet Computing.

[11]  David K. Gifford,et al.  Remote evaluation , 1990, TOPL.

[12]  D. Seret,et al.  A comparative study of security protocols validation tools: HERMES vs. AVISPA , 2006, 2006 8th International Conference Advanced Communication Technology.

[13]  Michael Wooldridge,et al.  Agent-based software engineering , 1997, IEE Proc. Softw. Eng..

[14]  Gael Hachez,et al.  A Comparative Study of Software Protection Tools Suited for E-Commerce with Contributions to Software Watermarking and Smart Cards , 2003 .

[15]  Daniel Serrano,et al.  Towards Secure Agent Computing for Ubiquitous Computing and Ambient Intelligence , 2007, UIC.

[16]  Rafael H. Bordini,et al.  Belief revision for AgentSpeak agents , 2006, AAMAS '06.

[17]  Guy L. Steele,et al.  The Java Language Specification , 1996 .

[18]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[19]  Christian S. Collberg,et al.  Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..