Evaluating Mobile Agent Platform Security

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed to assess agent platform security. These tests focus on malicious agents trying to attack other agents or the agency. Currently, they have been carried out for two agent platforms: JADE and SeMoA. These tests show which of the known theoretical security problems are relevant in practice. Furthermore, they reveal how these problems were addressed by the respective platform and what security flaws are present.

[1]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[2]  Volker Roth Programming Satan's Agents , 2001, Electron. Notes Theor. Comput. Sci..

[3]  Peter Braun,et al.  Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit , 2004 .

[4]  James E. White,et al.  Mobile Agents , 1997, Lecture Notes in Computer Science.

[5]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[6]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[7]  Gustavo A. Santana Torrellas A network security architectural approach for systems integrity using multi agent systems engineering , 2004, 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings..

[8]  Niklas Borselius Mobile agent security , 2002 .

[9]  Chenyang Lu,et al.  Mobile agent middleware for sensor networks: an application case study , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[10]  Gul A. Agha,et al.  Crawlets: Agents for High Performance Web Search Engines , 2001, Mobile Agents.

[11]  Peter Braun,et al.  Chapter 5 – Mobile Agent Security , 2005 .

[12]  Athanasios T. Karygiannis,et al.  SP 800-19. Mobile Agent Security , 1999 .

[13]  Wayne Jansen,et al.  NIST Special Publication 800-19 – Mobile Agent Security , 2000 .

[14]  Xin Guo,et al.  Rule-Driven Mobile Intelligent Agents for Real-Time Configuration of IP Networks , 2003, KES.

[15]  Christian Tschudin,et al.  Mobile Agent Security , 1999 .

[16]  Wayne A. Jansen,et al.  A Priviledge Management Scheme for Mobile Agent Systems , 2002, SEMAS.