An improved itinerary recording protocol for securing distributed architectures based on mobile agents

This paper proposes an improved itinerary recording protocol for securing distributed architectures based on mobile agents. The behavior of each of the cooperating agents is described, as well as the decision process establishing the identities of offenders when an attack is detected. Our protocol is tested on a set of potential attacks and the results confirm our assumption regarding offender designations and moments of detection. More precisely, the performance evaluation shows that our protocol detects the attack where there is collaboration between a platform on the cooperating agents' itinerary and another on the mobile agent's itinerary. As a result, this protocol constitutes a suitable option for electronic commerce applications where security concerns prevail over cost factors.

[1]  Dirk Westhoff,et al.  Protecting a Mobile Agent's Route against Collusions , 1999, Selected Areas in Cryptography.

[2]  Volker Roth,et al.  Empowering Mobile Software Agents , 2002, Mobile Agents.

[3]  George C. Necula,et al.  Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.

[4]  Judith Hylton SAFE: , 1993 .

[5]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[6]  Volker Roth,et al.  Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.

[7]  Ahmed Karmouch,et al.  Mobile software agents: an overview , 1998, IEEE Commun. Mag..

[8]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[9]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[10]  Volker Roth,et al.  On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection , 2001, Mobile Agents.

[11]  Alan O. Freier,et al.  SSL Protocol Version 3.0 Internet Draft , 1996 .

[12]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[13]  Fred B. Schneider,et al.  Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.

[14]  Catherine Meadows Detecting Attacks on Mobile Agents , 1997 .

[15]  Kwok-Wai Cheung,et al.  Protecting Mobile Agents Against Malicious Hosts by Intention Spreading , 1999, PDPTA.

[16]  Carlo Ghezzi,et al.  Analyzing Mobile Code Languages , 1996, Mobile Object Systems.

[17]  Dieter K. Hammer,et al.  Mobile software agents , 2000 .

[18]  권태경,et al.  SSL Protocol 기반의 서버인증 , 2003 .

[19]  Rolf Oppliger Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..

[20]  Fritz Hohl,et al.  A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.