MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets

This paper describes and discusses the malicious agent issues in the agent-mediated electronic markets. We define the malicious agents as software agents that have malicious purpose. Malicious agents can do harm in various ways, such as attacking normal agents, disordering deals, cheating users, stealing intimate information, wasting resources, destroying the markets and so on. We compare the malicious agents with PC viruses in four aspects: originations, actions, means of propagation & infection and speed of propagation & infection. In our opinion, malicious agents are more harmful than the common PC viruses in some measure. We proposed the MA and LMA architecture to deal with the problem described above. Besides, some agent transaction protocols are also presented to show how the MA and LMA architecture works. In the last of this paper, we give some implementation considerations as the foundation for further developments.

[1]  Timothy W. Finin,et al.  KQML as an agent communication language , 1994, CIKM '94.

[2]  George C. Necula,et al.  Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.

[3]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[4]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[5]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[6]  Christian F. Tschudin,et al.  Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[7]  Pattie Maes,et al.  Agents that buy and sell , 1999, CACM.

[8]  G. Shering,et al.  The NODAL system for the SPS 1974 , 1974 .

[9]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[10]  Refik Molva,et al.  Secure Data Collection with Updates , 2001, Electron. Commer. Res..

[11]  Sergio Loureiro,et al.  Function hiding based on error correcting codes , 1999 .

[12]  Colin George Harrison,et al.  Agent Sourcebook , 1997 .

[13]  Vipin Swarup,et al.  Authentication for Mobile Agents , 1998, Mobile Agents and Security.

[14]  M. R. Genesereth,et al.  Knowledge Interchange Format Version 3.0 Reference Manual , 1992, LICS 1992.

[15]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.