Rescuing mobile agent data in case of blocking attacks

Full-scale adoption of mobile agent technology in untrustworthy network environment, such as Internet, has been delayed due to several security complexities. The protection of mobile agents against the attacks of malicious hosts is considered a very challenging security problem. It has inspired lot of research interest, but very few measures exist to counter blocking attack where a host with malicious intentions refuses to transmit a mobile agent to the next host. It becomes an important requirement for the agent owner to rescue the data collected by the agent under custody and redeem a loss. In this paper, we present two schemes that rescue the offering results from a malicious host's blocking attack, and make a comparison of their performance from several aspects. Our approach has two new features that previous protocols lack. It allows the proper handling of time-sensitive offers and supports the gradual decision-making execution.

[1]  Elsabé Cloete,et al.  Classification of malicious host threats in mobile agent computing , 2002 .

[2]  Joos Vandewalle,et al.  (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.

[3]  Günter Karjoth,et al.  Secure Mobile Agent-Based Merchant Brokering in Distributed Marketplaces , 2000, ASA/MA.

[4]  Luís Moura Silva,et al.  Fault-tolerant execution of mobile agents , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.

[5]  Radu Popescu-Zeletin,et al.  An Approach for Providing Mobile Agent Fault Tolerance , 1998, Mobile Agents.

[6]  André Schiper,et al.  Fault-Tolerant Mobile Agent Execution , 2003, IEEE Trans. Computers.

[7]  Anand R. Tripathi,et al.  Design issues in mobile agent programming systems , 1998, IEEE Concurr..

[8]  Markus Straßer,et al.  A protocol for preserving the exactly-once property of mobile agents , 1997 .

[9]  Winfried Lamersdorf,et al.  Trends in Distributed Systems for Electronic Commerce , 1998, Lecture Notes in Computer Science.

[10]  Jose L. Muñoz,et al.  A protocol for detecting malicious hosts based on limiting the execution time of mobile agents , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[11]  Victor K.-W. Wei,et al.  Defenses against the Truncation of Computation Results of Free-Roaming Agents , 2002, ICICS.

[12]  Jianying Zhou,et al.  Protecting free roaming agents against result-truncation attack , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[13]  Markus Straßer,et al.  Providing Reliable Agents for Electronic Commerce , 1998, Trends in Distributed Systems for Electronic Commerce.