Advertisement

Towards a Secure Agent Platform Based on FIPA

  • Min Zhang
  • Ahmed Karmouch
  • Roger Impey
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2164)

Abstract

FIPA specification enables the interoperability among a diversity of agent platforms in a highly heterogeneous computing environment. Agents of different systems or providers, as far as they are all FIPA-compliant, can communicate and interact directly by Agent Communication Language (ACL). However, potential security threats in agent platforms are not fully addressed in both the FIPA specification and most of its implementations such as FIPA-OS. In order to add security features to FIPA, we propose a two-layer architecture that includes a security layer as the security extension to FIPA-OS. This architecture provides two types of security-related services to agents: a secure communication service which prevents any eavesdropping or interference from the outside network, and a secure execution environment service which protects server resources and agent services from any unauthorized access of agents. In this paper we present the design and implementation of this architecture as well as the trust model.

Keywords

Mobile Agent Authentication Protocol Certificate Authority Negotiation Protocol Security Layer 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

  1. 1.
    P. Kotzanikolaou, G. Katsirelos, V. Chrissikopoulos: Mobile agents for secure electronic transactions. Recent Advances in Signal Processing and Communications, World Scientific Engineering Society, p 363–368, 1999Google Scholar
  2. 2.
    A. Bieszczad, B. Pagurek, T. White: Mobile agents for network management, IEEE Communication Surveys, Vol.1 No.1, 1998Google Scholar
  3. 3.
    W. Theilmann, K. Rothermel: Domain experts for information retrieval in the World Wide Web: Proceeding of 2nd International Workshop on Cooperative Informative Agents (CIA’98) Springer-Verlag, p 216–227, 1998Google Scholar
  4. 4.
    R. Gray: Agent Tcl: A flexible and secure mobile-agent system. Proceedings of 1996 USENIX Tcl/Tk Workshop, p 9–23, San Diego, CA, 1996Google Scholar
  5. 5.
    D. Wong, N. Paciorek, T. Walsh, et al: Concordia: An Infrastructure for collaborating mobile agents, First International Workshop on Mobile Agents 97, LNCS 1219, p 86–98, Springer-Verlag, 1997.Google Scholar
  6. 6.
    ObjectSpace: Voyager Homepage, http:// objectspace.com/voyager
  7. 7.
    Joint submission, MASIF Specification, OMG TC Document orbos/97-10-05Google Scholar
  8. 8.
    Joint submission, FIPA Specification, FIPA homepage: http://www.fipa.org
  9. 9.
  10. 10.
    F. Bellifemine, G. Rimassa, A. Poggi: JADE — A FIPA compliant agent framework. In proceedings of the 4th International Conference and Exhibition on the practical Application of Intelligent Agents and Multi-Agents, p 97–108, London, 1999Google Scholar
  11. 11.
    C. Baumer, M. Breugst, S. Choy, T. Magedanz: Grasshopper-A universal agent platform based on OMG MASIF and FIPA standards, First International Workshop on Mobile Agents for Telecommunication Applications, p 1–18, Ottawa, 1999Google Scholar
  12. 12.
    H. Nwana, D. Ndumu, L. Lee, and J. Collis: ZEUS: A toolkit for building distributed multi-agent system, Applied Artificial Intelligence Journal, Vol. 13(1), p 129–185,1999CrossRefGoogle Scholar
  13. 13.
    K. Kato, K. Toumura, et al: Protected and secure mobile object computing in PLANET, Workshop Reader of the 10th European Conference on Object-Oriented Programming, p 319–326, 1997.Google Scholar
  14. 14.
    H. Peine: Security concepts and implementation in the Ara mobile agent system. Proceedings of 7th IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, June 1998.Google Scholar
  15. 15.
    JavaSoft, “Java Security”,1998, http://www.javasoft.com/security
  16. 16.
    G. Necula, P. Lee: Safe, Untrusted agents using proof-carrying code, Mobile Agents and Security, LNCS1419, p 61–91, Springer-Verlag, 1998.Google Scholar
  17. 17.
    D. Chess, B. Grosof, C. Harrison, D. Levine, and C. Parris: Itinerant agents for mobile computing, Technical Report OC 20010, IBM, march 1995Google Scholar
  18. 18.
    H. Fritz: Time limited blackbox security, Protecting mobile agent from malicious hosts, Mobile Agents and Security, LNCS1419, p 92–113, Springer-Verlag, 1998Google Scholar
  19. 19.
    S. Tomas, T. Christian: Protecting mobile agent against malicious hosts, Mobile Agents and Security, LNCS1419, p 44–60, Springer-Verlag, 1998Google Scholar
  20. 20.
    V. Giovanni: Protecting mobile agents through tracing, Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Finland, 1997Google Scholar
  21. 21.
    V. Roth: Secure Recording of itineraries through co-operating agents, Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems, p 297–298, 1998Google Scholar
  22. 22.
    M. Karnik, A. Tripathi: Security in the Ajanta mobile agent system, Technical Report, http://www.cs.umn.edu/Ajanta, 1999
  23. 23.
    S. Poslad, M. Calisti: Towards improved trust and security in FIPA agent platforms, the Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies, Spain, 2000.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Min Zhang
    • 1
  • Ahmed Karmouch
    • 1
  • Roger Impey
    • 2
  1. 1.Multimedia & Mobile Agent Research LaboratorySchool of Information Technology & Engineering (SITE)CANADA
  2. 2.Institute for Information TechnologyNational Research Council of CanadaOttawaCANADA

Personalised recommendations