Abstract
Mobile agent a new technology that satisfies the requirements of intelligence in distributed systems; also, it’s a paradigm that accepts networking and distribution as a basic concept. But this it’s still lacking when it comes to security which is a very important concept in the growth and development of this technology. In this paper we investigate the security of the distributed mobile agent system. We will present its benefits and we propose a new approach to improve the security of mobile agent communication while its migration, to grant the security agent, data, code and its environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Madsen, M.W.: An introduction to multi-agent statistics. CEUR Workshop Proc. 1208, 16–20 (2014)
Zrari, C., Hachicha, H., Ghedira, K.: Agent’s security during communication in mobile agents system. Proc. Comput. Sci. 60(1), 17–26 (2015)
Dadhich, P., Dutta, D.K., Govil, D.M.C.: Security issues in mobile agents. Int. J. Comput. Appl. 11(4), 1–7 (2010)
Kaur, M., Saxena, S.: A review of security techniques for mobile agents 807–812 (2017)
Alami-Kamouri, S., Orhanou, G., Elhajji, S.: Overview of mobile agents and security. In: Proceedings of—2016 International Conference on Engineering MIS, ICEMIS 2016, 2016
Gupta, J.K., Egorov, M., Kochenderfer, M.: Cooperative multi-agent control using deep reinforcement learning. Adapt. Learn. Agents (2017)
Alfalayleh, M., Brankovic, L.: An overview of security issues and techniques in mobile agents. In: Communications and Multimedia Security: 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, 15–18 Sept 2004, pp. 59–78. Windermere, The Lake District, United Kingdom, 2005
Hedin, Y., Moradian, E.: Security in multi-agent systems. Proc. Comput. Sci. 60(1), 1604–1612 (2015)
C.M.-F.: For S. M. Code and undefined 1997, Detecting attacks on mobile agents pdfs.semanticscholar.org
Lau, F., Rubin, S.H.S.S.H., Smith, M.H., Trajkovic, L.: Distributed denial of service attacks. Syst. Man Cybern. 3, 2275–2280 (2000)
Wilhelm, U.G.: A technical approach to privacy based on mobile agents protected by tamper-resistant hardware (1999)
Ogunnusi, O.S., Ogunlola, O.O.: Solutions to mobile agent security issues in open multi-agent systems. Int. Res. J. Eng. Technol. 2(5), 601–609 (2015)
Amro, B.: Mobile Agent Systems, Recent Security Threats and Counter Measures
Dagade, V., Kulkarni, C., Dhotre, S.R.: Mobile agent security based on code obfuscation and locator mechanism. Int. J. Comput. Appl. 975–8887
Chess, D.M.: Security Issues in Mobile Code Systems, pp. 1–14. Springer, Berlin (1998)
Pinzón, C.I., De Paz, J.F., Tapia, D.I., Bajo, J., Corchado, J.M.: Improving the security level of the FUSION@ multi-agent architecture. Expert Syst. Appl. 39(8), 7536–7545 (2012)
Karzan, A.A.: Erdogan, N.: Securing mobile agent systems in which the agents migrate via publish/subscribe paradigm. Lect. Notes Softw. Eng. 2(1) 2014
Hsu, C.L., Lin, Y.L.: Improved migration for mobile computing in distributed networks. Comput. Stand. Interfaces 36(3), 577–584 (2014)
Zwierko A., Kotulski, Z.: Security of mobile agents: a new concept of the integrity protection. Arxiv Prepr. cs/0506103 (2005)
Esfandi, A., Rahimabadi, A.M.: Mobile agent security in multi agent environments using a multi agent-multi key approach In: Proceedings of—2009 2nd IEEE International Conference on Computer Science and Information Technology ICCSIT 2009, pp. 438–442 (2009)
Vitabile, S., Conti, V., Militello, C., Sorbello, F.: An extended JADE-S based framework for developing secure multi-agent systems. Comput. Stand. Interfaces 31(5), 913–930 (2009)
Chau, J.: Digital certificates—is their importance underestimated? Comput. Fraud Secur. 2005(12), 14–16 (2005)
Wang, Y.H., Wu, I.C.: Achieving high and consistent rendering performance of java AWT/Swing on multiple platforms. Softw. Pract. Exp. 39(7), 701–736 (2009)
Warnier, M., Oey, M., Timmer, R., Brazier, F., Overeinder, B.: Enforcing integrity of agent migration paths by distribution of trust. Int. J. Intell. Inf. Database Syst. 3(4), 382 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Hanaoui, S., Berguig, Y., Laassiri, J. (2019). On the Security Communication and Migration in Mobile Agent Systems. In: Ezziyyani, M. (eds) Advanced Intelligent Systems for Sustainable Development (AI2SD’2018). AI2SD 2018. Advances in Intelligent Systems and Computing, vol 915. Springer, Cham. https://doi.org/10.1007/978-3-030-11928-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-11928-7_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11927-0
Online ISBN: 978-3-030-11928-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)