A security protocol for mobile agents based upon the cooperation of sedentary agents

Despite its many benefits, mobile agent technology results in significant security threats from agents and hosts. This paper presents a protocol which protects mobile agents from malicious hosts. This protocol combines four concepts: the cooperation between a mobile agent and a sedentary agent; the reference execution (reliable platforms which shelter our cooperating sedentary agents); the cryptography and the digital signature to ensure safe inter-agent communication and time-limited execution (timeout). A dynamic approach which makes use of a timer to make it possible to detect a mobile agent's code re-execution was used. The attack on agent permanent modification was also dealt with. Moreover, the protocol is sufficiently robust so that it is durable and fault tolerant.

[1]  Fritz Hohl,et al.  A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[2]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[3]  Stefan Poslad,et al.  Agent Technology for Communications Infrastructure: An Introduction , 2001 .

[4]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[5]  Thomas Magedanz,et al.  GRASSHOPPER - A UNIVERSAL AGENT PLATFORM BASED ON OMG MASIF AND FIPA STANDARDS , 2000 .

[6]  Anand R. Tripathi,et al.  A security architecture for mobile agents in Ajanta , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[7]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[8]  Robbert van Renesse,et al.  Cryptographic support for fault-tolerant distributed computing , 1996, EW 7.

[9]  S. Pierre,et al.  Secure protocol in mobile agent environment , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[10]  Volker Roth,et al.  Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.

[11]  Jan Vitek,et al.  Secure Internet Programming , 1999 .

[12]  William M. Farmer,et al.  Security for Mobile Agents: Issues and Requirements , 1996 .

[13]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[14]  Wayne A. Jansen,et al.  Countermeasures for mobile agent security , 2000, Comput. Commun..

[15]  Samuel Pierre,et al.  An improved itinerary recording protocol for securing distributed architectures based on mobile agents , 2005, Mob. Inf. Syst..

[16]  Philippe Schnoebelen,et al.  Systems and Software Verification, Model-Checking Techniques and Tools , 2001 .