Overview of mobile agent security issues — Solutions

Mobile agent systems are an active area of research with many issues still to be addressed before they achieve practical widespread use. Mobile agent is a mobile object that moves from host to host under the control of its own will to achieve task. Mobile agents are mainly intended to be used for applications distributed over large-scale networks since they permit reduction in communication costs by moving computation part to the host on which the target data resides. This paper gives an overview of the main security issues related to the mobile agent paradigm. These issues include security threats, requirements, and techniques for keeping the mobile agent platform and the agent itself secure against each other.

[1]  F. Chang,et al.  Secure, User-level Resource-constrained Sandboxing , 1999 .

[2]  Jan Vitek,et al.  Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .

[3]  U. Wilhelm Cryptographically Protected Objects , 1997 .

[4]  Luc Moreau,et al.  Extending execution tracing for mobile code security , 2002 .

[5]  Leila Ismail A Secure Mobile Agents Platform , 2008, J. Commun..

[6]  Kimmo E. E. Raatikainen,et al.  Agent migration between incompatible agent platforms , 2000, Proceedings 20th IEEE International Conference on Distributed Computing Systems.

[7]  Volker Roth,et al.  Mutual Protection of Co-operating Agents , 2001, Secure Internet Programming.

[8]  Wayne A. Jansen,et al.  Mobile Agent Security , 1999 .

[9]  FangzheChang Secure, User-level Resource-constrained Sandboxing , 1999 .

[10]  Fangzhe Chang,et al.  User-level resource-constrained sandboxing , 2000 .

[11]  Volker Roth,et al.  Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.

[12]  Rolf Oppliger Security issues related to mobile code and agent-based systems , 1999, Comput. Commun..

[13]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[14]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[15]  Mahesh Chandra Govil,et al.  Security Issues in Mobile Agents , 2010 .

[16]  Samuel Pierre,et al.  A security protocol for mobile agents based upon the cooperation of sedentary agents , 2007, J. Netw. Comput. Appl..

[17]  Wayne Jansen,et al.  NIST Special Publication 800-19 – Mobile Agent Security , 2000 .

[18]  Sandhya Armoogum,et al.  Obfuscation Techniques for Mobile Agent code confidentiality , 2011 .