A Scalable and Secure Global Tracking Service for Mobile Agents

  • Volker Roth
  • Jan Peters
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2240)


In this paper, we propose a global tracking service for mobile agents, which is scalable to the Internet and accounts for security issues as well as the particularities of mobile agents (frequent changes in locations). The protocols we propose address agent impersonation, malicious location updates, as well as security issues that arise from profiling location servers, and threaten the privacy of agent owners. We also describe the general framework of our tracking service, and some evaluation results of the reference implementation we made.


mobile agents tracking agent name security 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Yariv Aridor and Mitsuru Oshima. Infrastructure for mobile agents: Requirements and design. In Rothermel and Hohl [15], pages 38–49.Google Scholar
  2. 2.
    Joachim Baumann and Kurt Rothermel. The ShadowApproach:An orphan detection protocol for mobile agents. In Rothermel and Hohl [15], pages 2–13.Google Scholar
  3. 3.
    L. Bernardo and P. Pinto. A scalable location service with fast update responses. In IEEE Global Telecommunications Conference (GLOBECOM’98), volume 5, pages 2876–2881, 1998.Google Scholar
  4. 4.
    Michael Bursell, Richard Hayton, Douglas Donaldson, and Andrew Herbert. A Mobile Object Workbench. In Rothermel and Hohl [15], pages 136–147.Google Scholar
  5. 5.
    Thomas H. Cormen, Charles E. Leiserson, and Ronald L. Rivest. Introduction to Algorithms. McGraw-Hill, 1996.Google Scholar
  6. 6.
    FIPS180-1. Secure Hash Standard. Federal Information Processing Standards Publication 180-1, U.S. Department of Commerce/National Bureau of Standards, National Technical Information Service, Springfield, Virginia, April 1995. supersedes FIPS 180:1993.Google Scholar
  7. 7.
    S. Lazar, I. Weerakoon, and D. Sidhu. A scalable location tracking and message delivery scheme for mobile agents. In Proceedings Seventh IEEE InternationalWorkshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE’98), pages 243–248. IEEE Computer Society Press, 1998.Google Scholar
  8. 8.
    Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. Discrete Mathematics and its Applications. CRC Press, New York, 1996. ISBN 0-8493-8523-7.Google Scholar
  9. 9.
    D. Milojicic, W. LaForge, and D. Chauhan. Mobile Objects and Agents (MOA). In Proc. of the Fourth USENIX Conference on Object-Oriented Technologies and Systems (COOTS’98), April 1998.Google Scholar
  10. 10.
    Luc Moreau. Distributed directory service and message routing for mobile agents. Technical Report ECSTR M99/3, Department of Electronics and Computer Science, University of Southampton, November 1999.Google Scholar
  11. 11.
    Amy L. Murphy and Gian Pietro Picco. Reliable communication for highly mobile agents. In Proc. First International Symposium on Agent Systems and Applications, and Third International Symposium on Mobile Agents (ASA/MA’99), pages 141–150. IEEE Computer Society Press, 1999.Google Scholar
  12. 12.
    Volker Roth. Scalable and Secure Global Name Services for Mobile Agents. 6th ECOOP Workshop on Mobile Object Systems: Operating System Support, Security and Programming Languages (Cannes, France, June 2000).Google Scholar
  13. 13.
    Volker Roth. Programming Satan’s Agents. In 1st InternationalWorkshop on Secure Mobile Multi-Agent Systems, Montreal, Canada, 2001.Google Scholar
  14. 14.
    Volker Roth and Mehrdad Jalali. Concepts and architecture of a security-centric mobile agent server. In Proc. Fifth International Symposium on Autonomous Decentralized Systems (ISADS 2001), Dallas, Texas, U.S.A., March 2001. IEEE Computer Society Press. Accepted for publication.Google Scholar
  15. 15.
    K. Rothermel and F. Hohl, editors. Proceedings of the Second International Workshop on Mobile Agents (MA’ 98), volume 1477 of Lecture Notes in Computer Science. Springer Verlag, Berlin Heidelberg, September 1998.Google Scholar
  16. 16.
    Peter Sewell, Pawel Wojciechowski, and Benjamin Pierce. Location-independent communication for mobile agents: a two-level architecture. Technical Report 462, Computer Laboratory, University of Cambridge, April 1999.Google Scholar
  17. 17.
    A. Di Stefano, L. Lo Bello, and C. Santoro. Naming and locating mobile agents in an Internet environment. In Proc. Third International Enterprise Distributed Object Computing Conference (EDOC’ 99), pages 153–161, 1999.Google Scholar
  18. 18.
    Andrew S. Tanenbaum. Modern Operating Systems. Prentice Hall, Inc., 1992.Google Scholar
  19. 19.
    M. van Steen, F. J. Hauck, P. Homburg, and A. S. Tanenbaum. Locating Objects inWide-Area Systems. IEEE Communications Magazine, pages 104–109, January 1998.Google Scholar
  20. 20.
    Pawel Wojciechowski and Peter Sewell. Nomadic Pict: Language and Infrastructure Design for Mobile Agents. In Proc. First International Symposium on Agent Systems and Applications, and Third International Symposium on Mobile Agents (ASA/MA’ 99), volume 2, pages 821–826, October 1999.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Volker Roth
    • 1
  • Jan Peters
    • 1
  1. 1.Fraunhofer Institut für Graphische DatenverarbeitungDarmstadtGermany

Personalised recommendations