Skip to main content

Dispatching Mobile Agents with Secure Routes in Parallel

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2229))

Included in the following conference series:

Abstract

In a distributed environment like the Internet, mobile agents can be employed to perform autonomous tasks such as searching and negotiating. However, for mobile agents to be widely accepted, performance and security issues on their use have to be addressed. In this paper, we propose a parallel dispatch model with secure route structures for protecting the dispatch routes of agents. This model facilitates efficient dispatching of agents in a hierarchical manner, and ensures route security by exposing minimal route information to hosts. To further enhance route robustness, we also propose a mechanism with substitute routes that can bypass temporarily unreachable hosts, using substitute hosts for deploying right dispatch branches and make later attempts to these failed hosts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sohn, S. and Yoo, K. J.: An Architecture of Electronic Market Applying Mobile Agent technology. Proceeding of 3rd IEEE Symposium on Computers and Communications (ISCC’ 98), Athens, Greece, (1998) 359–364

    Google Scholar 

  2. Corradi, A., Montanari R., and Stefanelli C.: Mobile Agents in E-commerce Applications. Proceedings of 19th IEEE International Conference on Distributed Computing Systems, Workshops on Electronic Commerce and Web-based Applications, Austin, Texas, USA, (1999) 59–64

    Google Scholar 

  3. Chrysanthis, P., Znati, T., Banerjee, S., and Chang, S.K.: Establishing Virtual Enterprises by means of Mobile Agents. Proceeding of Ninth International Workshop on Research Issues on Data Engineering: Information Technology for Virtual Enterprises (RIDE-VE’ 99), Sydney, Australia, (1999) 116–123

    Google Scholar 

  4. Rodrigo, T. D. and Stanski, A.: The Evolving Future of Agent-based Electronic Commerce. In Rahman S. M. and Raisinghani M. S. Electronic (eds.): Commerce: Opportunity and Challenges, Idea Group Publishing, Hershey, USA, (2000) 337–351

    Google Scholar 

  5. Silva, L., Batista, M., Martins V., and Soares, G.: Using Mobile Agents for Parallel Processing. Proceeding of International Symposium on Distributed Objects and Applications (DOA’99), Edinburgh, Scotland, (1999) 34–42

    Google Scholar 

  6. Papastavrou, S., Samaras G., and Pitoura, E.: Mobile agents for World Wide Web distributed database access. IEEE Transactions on Knowledge and Data Engineering, Vol. 12, Issue 5, (2000) 802–820

    Article  Google Scholar 

  7. Karjoth, G., Lange D.B., and Oshima, M.: A Security Model for Aglets. IEEE Internet Computing, July–August (1997) 68–77

    Google Scholar 

  8. Varadharajan, V.: Security enhanced mobile agents. Proceedings of the 7th ACM conference on Computer and communications security, Athens, Greece, (2000) 200–209

    Google Scholar 

  9. Ubayashi, N., Tamai, T.: RoleEP: role based evolutionary programming for cooperative mobile agent applications. Proceedings of International Symposium on Principles of Software Evolution, (2000) 232–240

    Google Scholar 

  10. Wayner, P.: Digital Copyright Protection. SP Professional, Boston, USA, (1997)

    Google Scholar 

  11. Lange, D., and Oshima, M.: Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley Press, Massachusetts, USA (1998)

    Google Scholar 

  12. Westhoff, D., Schneider, M., Unger, C. and Kenderali, F.: Methods for Protecting a Mobile Agent’s Route. Proceedings of the Second International Information Security Workshop (ISW’99), Lecture Notes in Computer Science, LNCS 1729, Springer-Verlag, Berlin Heidelberg New York, (1999) 57–71

    Google Scholar 

  13. Li, T., Seng, C.K. and Lam, K.Y.: A Secure Route Structure for Information Gathering. Proceedings of 2000 Pacific Rim International Conference on AI, Melbourne, Australia, (2000)

    Google Scholar 

  14. Belle, W.V., Verelst, K. and D'Hondt, T.: Location transparent routing in mobile agent systems merging name lookups with routing. Proceedings of 7th IEEE Workshop on Future Trends of Distributed Computing Systems, (1999) 207–212

    Google Scholar 

  15. Maass, H.: Location-aware Mobile Applications Based Directory Services. Mobile Networks and Applications, Baltzer Science Publishers BV, (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, Y., Tan, KL. (2001). Dispatching Mobile Agents with Secure Routes in Parallel. In: Qing, S., Okamoto, T., Zhou, J. (eds) Information and Communications Security. ICICS 2001. Lecture Notes in Computer Science, vol 2229. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45600-7_43

Download citation

  • DOI: https://doi.org/10.1007/3-540-45600-7_43

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42880-0

  • Online ISBN: 978-3-540-45600-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics