Empowering Mobile Software Agents

Recent work has shown that several cryptographic protocols for the protection of free-roaming mobile agents are vulnerable by means of protocol interleaving attacks. This paper presents equivalent protocols meant to be robust against this type of attack. Moreover, it describes the required processes and data structures at a level of detail that can be translated to an implementation in a straightforward way. Our aim is to demonstrate how cryptographic processing can be implemented transparently for agent programmers, thereby reducing the risks of human error in (secure) mobile agent programming.

[1]  Sergio Loureiro,et al.  Mobile code protection , 2001 .

[2]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[3]  C. Stefanelli,et al.  Mobile agents protection in the Internet environment , 1999, Proceedings. Twenty-Third Annual International Computer Software and Applications Conference (Cat. No.99CB37032).

[4]  Volker Roth,et al.  Concepts and architecture of a security-centric mobile agent server , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.

[5]  Volker Roth,et al.  On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection , 2001, Mobile Agents.

[6]  Jan Vitek,et al.  Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .

[7]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[8]  C. M. Sperberg-McQueen,et al.  Extensible Markup Language (XML) , 1997, World Wide Web J..

[9]  D. B. Davis,et al.  Sun Microsystems Inc. , 1993 .

[10]  Volker Roth,et al.  Encrypting Java Archives and Its Application to Mobile Agent Security , 2001, AgentLink.

[11]  Mihir Bellare,et al.  Forward Integrity For Secure Audit Logs , 1997 .

[12]  C. M. Sperberg-McQueen,et al.  eXtensible Markup Language (XML) 1.0 (Second Edition) , 2000 .

[13]  Robbert van Renesse,et al.  An introduction to the TACOMA distributed system. Version 1.0 , 1995 .

[14]  Günter Karjoth,et al.  Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces , 2000, ASA/MA.

[15]  Kenneth H. Rosen,et al.  Discrete Mathematics and its applications , 2000 .

[16]  Volker Roth,et al.  Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.