Secure protocol in mobile agent environment

The main problem that counters the deployment of the mobile agents environment is related to the security aspect of the mobile agents and the platform executing them. In this paper, we introduce a secure protocol for these environments which protects the mobile agents against the attacks of malicious hosts. The protection is based on the perfect cooperation of a sedentary agent running inside a trusted third host. The results have proved A El Rhazi (2003) that the protocol protects truly the mobile agent and the performances of the applications using this technology will not be severely affected.

[1]  Fritz Hohl,et al.  A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[2]  Levente Buttyán,et al.  Introducing Trusted Third Parties to the Mobile Agent Paradigm , 2001, Secure Internet Programming.

[3]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[4]  Volker Roth,et al.  Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.

[5]  Jan Camenisch,et al.  Cryptographic security for mobile code , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[6]  Anand R. Tripathi,et al.  A security architecture for mobile agents in Ajanta , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.