A secure mobile agent protocol for vehicular communication systems

A Mobile agent (MA) is an intelligent software that performs tasks on behalf of its owner. MAs collect results migrating from one node to another. MAs have a small size and a low requirement of network bandwidth, they also reduce the load of the network making a Mobile Agent System (MAS) a preferred solution in distributed applications. Intelligent Vehicular Communication Systems are an excellent exemplary candidate for such applications. Although MAs flexibility is a great add on to application however, ensuring their security is considered a challenging task due to its network openness. In this paper, a novel Secure Mobile Agent Protocol (SMAP) dedicated for Vehicular Communication Systems is proposed. SMAP provides the essential security requirements e.g. mutual authentication, confidentiality, integrity, accountability, non repudiation and authorization. Using SMAP owner vehicles receive results as soon as they are requested and therefore, providing fast information retrieval process. Moreover, another important feature of SMAP is that unlike other protocols the loss of the MA does not necessary mean the loss of all the collected data. Furthermore, SMAP guarantees protection from many security attacks such as, Man In The Middle (MITM), replay, masquerade, modification and unauthorized access attacks. Verified using the well known formal verification tool Scyther, SMAP is proven to be a suitable protocol for securing vehicular communication links from malicious actions.

[1]  Xu Huang,et al.  E-health Services with Secure Mobile Agent , 2009, 2009 Seventh Annual Communication Networks and Services Research Conference.

[2]  Rafal Leszczyna,et al.  Anonymity Architecture for Mobile Agent Systems , 2007, HoloMAS.

[3]  Ig Ibert Bittencourt,et al.  A survey of security in multi-agent systems , 2012, Expert Syst. Appl..

[4]  Zubair A. Baig Multi-agent systems for protecting critical infrastructures: A survey , 2012, J. Netw. Comput. Appl..

[5]  M. E. Correia,et al.  A literature review of security mechanisms employed by mobile agents , 2012, 7th Iberian Conference on Information Systems and Technologies (CISTI 2012).

[6]  Dharmendra Sharma,et al.  2011 International Conference on Electrical Engineering and Informatics 17-19 July 2011 , Bandung , Indonesia Enhancing Security in E-health Services using Agent , 2011 .

[7]  Habiba Drias,et al.  Towards a Security Solution for Mobile Agents , 2013, WorldCIST.

[8]  Amirreza Masoumzadeh,et al.  A survey of security issue in multi-agent systems , 2011, Artificial Intelligence Review.

[9]  Mahmoud Al-Qutayri,et al.  Security and Privacy of Intelligent VANETs , 2010 .

[10]  Jong Hyuk Park,et al.  A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication , 2011, Int. J. Commun. Syst..

[11]  Pascal Lafourcade,et al.  Key Management Protocol in WIMAX Revisited , 2012 .

[12]  Behrouz Tork Ladani,et al.  Anonymity and security for autonomous mobile agents , 2010, IET Inf. Secur..

[13]  Mohamed Jamal Zemerly,et al.  A new lightweight hybrid cryptographic algorithm for the internet of things , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[14]  Wen-Chung Kuo,et al.  An efficient and secure anonymous mobility network authentication scheme , 2014, J. Inf. Secur. Appl..

[15]  Chan Yeob Yeun,et al.  Recent Advances in VANET Security: A Survey , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[16]  Ping Chen,et al.  Mobile Agents Integrity Research , 2007, I3E.

[17]  Jong Hyuk Park,et al.  Secure and efficient public key management in next generation mobile networks , 2011, Personal and Ubiquitous Computing.

[18]  Jose M. Alcaraz Calero,et al.  Distributed security for multi-agent systems - review and applications , 2010, IET Inf. Secur..

[19]  L. Futcher,et al.  IFIP – The International Federation for Information Processing , 2004 .

[20]  G. Geetha,et al.  Implementation of Trust and Reputation Management for Free-Roaming Mobile Agent Security , 2015, IEEE Systems Journal.

[21]  Chris J. Mitchell,et al.  Supporting User Privacy in Location Based Services , 2005, IEICE Trans. Commun..

[22]  Gora Chand Nandi,et al.  Self-reliant mobile code: a new direction of agent security , 2014, J. Netw. Comput. Appl..

[23]  Wilmuth Müller,et al.  Evaluating the security of mobile agent platforms , 2009, Autonomous Agents and Multi-Agent Systems.

[24]  G. Geetha,et al.  Data Security in Free Roaming Mobile Agents , 2011 .

[25]  Qutaibah M. Malluhi,et al.  Advances in Intelligent Systems and Computing , 2015 .

[26]  Mohammed Badrul Hasan,et al.  A review of security implications and possible solutions for mobile agents in e-commerce , 2009, 2009 Innovative Technologies in Intelligent Systems and Industrial Applications.

[27]  Cas J. F. Cremers,et al.  The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.

[28]  Carles Garrigues,et al.  Protecting mobile agents from external replay attacks , 2009, J. Syst. Softw..

[29]  Cas J. F. Cremers,et al.  Operational Semantics and Verification of Security Protocols , 2012, Information Security and Cryptography.

[30]  Mohamed Jamal Zemerly,et al.  Formal modeling and verification of DLK protocol , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[31]  Charalampos Konstantopoulos,et al.  Mobile recommender systems in tourism , 2014, J. Netw. Comput. Appl..