An Improved Execution Integrity Solution for Mobile Agents

In this paper we introduce a new infrastructural approach to providing mobile agent execution integrity, a very important property – especially to the confidence an agent user can place in the results of its deployed autonomous mobile agents. Existing mobile agent execution integrity schemes are shown to be comparatively inferior when analysed in light of a number of essential robustness properties. We provide an analysis of Hohl’s reference states scheme and introduce our novel execution integrity scheme, which builds – in part – on Hohl’s scheme. Besides significantly improving on this existing scheme, our scheme meets all of the desired criteria for a robust execution integrity scheme.

[1]  Gerhard Weiss,et al.  Multiagent systems: a modern approach to distributed artificial intelligence , 1999 .

[2]  Ming Yao,et al.  A security architecture for protecting dynamic components of mobile agents , 2004 .

[3]  Luc Moreau,et al.  Extending execution tracing for mobile code security , 2002 .

[4]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[5]  Uwe Georg Wilhelm,et al.  A TECHNICAL APPROACH TO PRIVACY BASED ON MOBILE AGENTS PROTECTED BY TAMPER-RESISTANT HARDWARE , 1999 .

[6]  Bernd Meyer,et al.  Ensuring the Integrity of Agent-Based Computations by Short Proofs , 1998, Mobile Agents.

[7]  Fritz Hohl,et al.  A framework to protect mobile agents by using reference states , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[8]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[9]  George Samaras Mobile agents: What about them? Did they deliver what they promised? Are they here to stay? (panel) , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[10]  Selwyn Russell,et al.  Clever Use of Trusted Third Parties for Mobile Agent Security , 2004 .

[11]  Wayne A. Jansen,et al.  Countermeasures for mobile agent security , 2000, Comput. Commun..

[12]  William M. Farmer,et al.  Security for Mobile Agents: Issues and Requirements , 1996 .

[13]  Selwyn Russell,et al.  A Step Closer to a Secure Internet Mobile Agent Community , 2004 .

[14]  Anand R. Tripathi,et al.  Security in mobile agent systems , 1998 .

[15]  Michelangelo Giansiracusa,et al.  A secure infrastructural strategy for safe autonomous mobile agents , 2005 .

[16]  Volker Roth,et al.  Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept , 2004, ICICS.

[17]  Ljiljana Brankovic,et al.  An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.

[18]  Volker Roth Obstacles to the adoption of mobile agents , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[19]  Joos Vandewalle,et al.  (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.

[20]  Fritz Hohl,et al.  A protocol to detect malicious hosts attacks by using reference states , 1999 .