Security Issues in Mobile Agents

Software security to protect mobile agent consists of lots of aspects like cryptography, access control and trust management, intrusion detection and tamper resistance, authentication and privacy, signature schemes, e-commerce, security analysis, mobile computing security etc. So, to design and develop security mechanisms for mobile agents against malicious hosts this paper identifies different kinds of attacks and relationships between them. Security objectives and requirements are analyzed with security measures taken to protect mobile code, state and data.

[1]  Sarit Kraus,et al.  Multiagent Negotiation under Time Constraints , 1995, Artif. Intell..

[2]  Jon Ølnes,et al.  Mobile Agent Security - Issues and Directions , 1999, IS&N.

[3]  Danny B. Lange,et al.  Mobile Objects and Mobile Agents: The Future of Distributed Computing? , 1998, ECOOP.

[4]  Fritz Hohl,et al.  Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.

[5]  Anand S. Rao,et al.  A Model-Theoretic Approach to the Verification of Situated Reasoning Systems , 1993, IJCAI.

[6]  Ljiljana Brankovic,et al.  An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.

[7]  David M. Chess,et al.  Security Issues in Mobile Code Systems , 1998, Mobile Agents and Security.

[8]  William M. Farmer,et al.  Security for Mobile Agents: Issues and Requirements , 1996 .

[9]  Jan Vitek,et al.  Security and Communication in Mobile Object Systems , 1996, Mobile Object Systems.

[10]  Jan Camenisch,et al.  Cryptographic security for mobile code , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[11]  Michael P. Georgeff,et al.  Communication and interaction in multi-agent planning , 1983, AAAI 1983.

[12]  Manuela M. Veloso,et al.  Multiagent Systems: A Survey from a Machine Learning Perspective , 2000, Auton. Robots.

[13]  Sergi Robles Martínez Mobile agent systems and trust, a combined view toward secure sea-of-data applications , 2002 .

[14]  Uwe Georg Wilhelm,et al.  A TECHNICAL APPROACH TO PRIVACY BASED ON MOBILE AGENTS PROTECTED BY TAMPER-RESISTANT HARDWARE , 1999 .

[15]  Giovanni Vigna,et al.  Understanding Code Mobility , 1998, IEEE Trans. Software Eng..

[16]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[17]  Anand R. Tripathi,et al.  Mobile agent programming in Ajanta , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).

[18]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[19]  Bruce Schneier,et al.  Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.

[20]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[21]  David Wong,et al.  Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.

[22]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[23]  Lu Ma,et al.  ATTACKS AND COUNTERMEASURES IN SOFTWARE SYSTEM SECURITY , 2005 .

[24]  李幼升,et al.  Ph , 1989 .

[25]  Alfred V. Aho,et al.  Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.

[26]  Todd A. Proebsting,et al.  Krakatoa: Decompilation in Java (Does Bytecode Reveal Source?) , 1997, COOTS.

[27]  Niklas Borselius Mobile agent security , 2002 .

[28]  Dan S. Wallach,et al.  A new approach to mobile code security , 1999 .

[29]  William M. Farmer,et al.  Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.

[30]  Anand R. Tripathi,et al.  Security in mobile agent systems , 1998 .

[31]  Daniel Kuokka,et al.  Issues and Extensions for Information Matchmaking Protocols , 1996, Int. J. Cooperative Inf. Syst..

[32]  Christian F. Tschudin,et al.  Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.

[33]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[34]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[35]  Cristina Cifuentes,et al.  Decompilation of binary programs , 1995, Softw. Pract. Exp..

[36]  Michael Rovatsos,et al.  Handbook of Software Engineering and Knowledge Engineering , 2005 .

[37]  Anand R. Tripathi,et al.  Design issues in mobile agent programming systems , 1998, IEEE Concurr..

[38]  Levent Ertaul,et al.  Mobile Agent Security , 2006, Security and Management.

[39]  Yoav Shoham,et al.  Agent-Oriented Programming , 1992, Artif. Intell..

[40]  M. Calisti,et al.  FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2000 .

[41]  Nicholas R. Jennings,et al.  Pitfalls of agent-oriented development , 1998, AGENTS '98.

[42]  William D. McInerney,et al.  3 – Attacks and Countermeasures , 1987 .

[43]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[44]  G. Glass ObjectSpace Voyager core package technical overview , 1999 .

[45]  John Zachary Protecting Mobile Code in the Wild , 2003, IEEE Internet Comput..

[46]  Thomas R. Gruber,et al.  A Translation Approach to Portable Ontologies , 1993 .

[47]  Bennet S. Yee,et al.  Using Secure Coprocessors , 1994 .

[48]  Dejan S. Milojicic,et al.  Trend Wars - Mobile agent applications , 1999, IEEE Concurrency.

[49]  Joos Vandewalle,et al.  (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.

[50]  Wayne Jansen,et al.  NIST Special Publication 800-19 – Mobile Agent Security , 2000 .

[51]  M.B. Ahmed,et al.  Mobile agents security , 2005, 2005 2nd Asia Pacific Conference on Mobile Technology, Applications and Systems.

[52]  Johann Wolfgang,et al.  AN INFRASTRUCTURE FOR MOBILE AGENTS : REQUIREMENTS AND ARCHITECTURE , 1995 .

[53]  Vijay Varadharajan Security enhanced mobile agents , 2000, CCS.

[54]  James E. White,et al.  Mobile Agents , 1997, Lecture Notes in Computer Science.

[55]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[56]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[57]  Vipin Swarup,et al.  Authentication for Mobile Agents , 1998, Mobile Agents and Security.

[58]  Aaron Kershenbaum,et al.  Mobile Agents: Are They a Good Idea? , 1996, Mobile Object Systems.

[59]  Jan Vitek,et al.  Mobile Object Systems Towards the Programmable Internet , 1996, Lecture Notes in Computer Science.

[60]  Yoav Shoham Agent-Oriented Programming , 1993, Artif. Intell..

[61]  Huanguo Zhang,et al.  The Mobile Agent Security Enhanced by Trusted Computing Technology , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[62]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[63]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[64]  Katia P. Sycara,et al.  Resolving Goal Conflicts via Negotiation , 1988, AAAI.

[65]  Marcin Paprzycki,et al.  Mobile Agent Security - an Overview , 2004 .

[66]  Michael Wooldridge,et al.  Agent-based software engineering , 1997, IEE Proc. Softw. Eng..

[67]  Ahmed Sameh Mohamed,et al.  Security in mobile agent systems , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT 2002).

[68]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .