A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios

This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the objectives behind the development of these agent communities and analyses the security vulnerabilities, which arise within them. To counter these vulnerabilities, the paper proposes a Buddy model of security for the agent community. In this model, every agent protects its neighbour within the community, thereby sharing the responsibilities of the security function. This feature makes it a better option as compared to other hierarchical models of security, which can be brought down by a concerted attack at the controller agent. This paper also demonstrates the applicability and the effectiveness of the Buddy model in different pervasive scenarios and makes a strong case for its adoption.

[1]  Maria Indrawan,et al.  Security Aspects of Software Agents in Pervasive Information Systems , 2003 .

[2]  Qusay H. Mahmoud Security Policy: A Design Pattern for Mobile Java Code , 2000 .

[3]  James A. Gosling,et al.  The java language environment: a white paper , 1995 .

[4]  Adam Cheyer,et al.  The Open Agent Architecture , 1997, Autonomous Agents and Multi-Agent Systems.

[5]  Danny B. Lange,et al.  Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .

[6]  Arthur C. Graesser,et al.  Is it an Agent, or Just a Program?: A Taxonomy for Autonomous Agents , 1996, ATAL.

[7]  Wayne A. Jansen,et al.  Countermeasures for mobile agent security , 2000, Comput. Commun..

[8]  Thomas Wheeler Developing Peer Applications with Voyager , 2004 .

[9]  Guy L. Steele,et al.  The Java Language Specification , 1996 .

[10]  Volker Roth,et al.  Secure Recording of Itineraries through Co-operating Agents , 1998, ECOOP Workshops.

[11]  John K. Ousterhout,et al.  Tcl and the Tk Toolkit , 1994 .

[12]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[13]  David Wong,et al.  Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.

[14]  William M. Farmer,et al.  Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.

[15]  Yi-Ping Hung,et al.  Integrating virtual objects into real images for augmented reality , 1998, VRST '98.

[16]  Dejan S. Milojicic,et al.  MASIF: The OMG mobile agent system interoperability facility , 1998, Personal Technologies.

[17]  Maria Indrawan,et al.  Evaluating Security in Software Agent Systems using a Security Analysis Tool , 2003 .