Toward a security architecture for smart messages: challenges, solutions, and open issues

Smart Messages (SMs) are migratory execution units used to describe distributed computations over mobile ad hoc networks of embedded systems. The main benefits provided by SMs are flexibility, scalability, and the ability to perform distributed computations over networks composed of heterogeneous, resource constrained, unattended embedded systems. A key challenge that confronts SMs, however, is how to define a security architecture that protects both the SMs and the hosts, while preserving the SM benefits. In this paper we present a basic SM security architecture which sets up a framework for the security related issues of SMs and provides solutions for authentication, authorization, and secure SM migration. Since this paper is the first attempt to investigate the unique security challenges posed by a system based on mobile code executed over mobile ad hoc networks, we also discuss the main issues that remain to be solved for a more comprehensive SM security architecture.

[1]  Anand R. Tripathi,et al.  Agent Server Architecture for the Ajanta Mobile-Agent System , 1998 .

[2]  Charles Adams,et al.  Understanding Public-Key Infra-structure: Concepts, Standards, and Deployment Con-siderations , 1999 .

[3]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[4]  A.S. Tanenbaum,et al.  Security in a mobile agent system , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.

[5]  George Cybenko,et al.  Mobile Agents: Motivations and State-of-the-Art Systems , 2000 .

[6]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[7]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[8]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[9]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[10]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[11]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[12]  T. Aura,et al.  Robust Membership Management for Ad-hoc Groups , 2000 .

[13]  N. Asokan,et al.  Key agreement in ad hoc networks , 2000, Comput. Commun..

[14]  Gruia-Catalin Roman,et al.  Consistent group membership in ad hoc networks , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[15]  Liviu Iftode,et al.  Self-routing in pervasive computing environments using smart messages , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[16]  David E. Culler,et al.  System architecture directions for networked sensors , 2000, SIGP.

[17]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[19]  Fred B. Schneider,et al.  COCA: a secure distributed online certification authority , 2002 .

[20]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[21]  Michael K. Reiter,et al.  Byzantine quorum systems , 1997, STOC '97.

[22]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[23]  Liviu Iftode,et al.  Cooperative computing for distributed embedded systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[24]  Dejan S. Milojicic,et al.  Mobile Objects and Agents (MOA) , 1998, Distributed Syst. Eng..