Advertisement

Securing Mobile Agents, Stationary Agents and Places in Mobile Agents Systems

  • Donies SametEmail author
  • Farah Barika Ktata
  • Khaled Ghedira
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 96)

Abstract

A challenging problem to solve to take full advantage of the benefits of mobile agent (MA) technology is to overcome security problems. In fact, in most cases, the security aspects are taken into account on the implementation stage of software development process, which may lead to the negligence of several aspects of security. However, including security properties in the design stage could lead to the development of a more secure MA system, especially that current MA platforms do not cover all security criteria. In this paper, we present a detailed modelling of security properties related to the security of mobile agents, stationary agents and places. The proposed model allows taking into account the security aspect earlier on the software development process and also it can be a first step to help researchers ameliorating security level on MA platforms.

Keywords

Mobile Agent Security MA-UML profile Agent oriented software engineering 

References

  1. 1.
    Mouratidis, H., Giorgini, P., Manson, G.: Modelling secure multiagent systems. In: AAMAS 2003 Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems, Melbourne, Australia, 14–18 July 2003Google Scholar
  2. 2.
    Samet, D., Ktata, F.B., Ghedira, K.: Security and trust on mobile agent platforms: a survey. In: KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, Vilamoura, Portugal (2017)Google Scholar
  3. 3.
    Jansen, W., Karygiannis, T.: Mobile Agent Security. NiST Special Publication 800-19 (2000)Google Scholar
  4. 4.
    Alfalayleh, M., Brankovic, L.: An overview of security issues and techniques in mobile agents. In: Conference on Communications and Multimedia Security. University of Newcastle, Australia (2004)Google Scholar
  5. 5.
    Hachicha, H., Samet, D., Ghedira, K.: A conceptual approach to place security in systems of mobile agents. In: 13th German Conference, MATES 2015, Cottbus, Germany, 28–30 September 2015Google Scholar
  6. 6.
    Loulou, M., Jmaiel, M., Hadj Kacem, A., Mosbah, M.: A conceptual model for secure mobile agent systems. In: International Conference on Computational Intelligence and Security, Guangzhou, China (2006)Google Scholar
  7. 7.
    Ma, L., Tsai, J.: Formal modeling and analysis of a secure mobile-agent system. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 38(1), 180–196 (2008)CrossRefGoogle Scholar
  8. 8.
    Rekik, M., Kallel, S., Loulou, M., Hadj Kacem, A.: Modeling secure mobile agent systems. In: KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications, Dubrovnik, Croatia (2012)CrossRefGoogle Scholar
  9. 9.
    Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285–309 (2007)CrossRefGoogle Scholar
  10. 10.
    Huget, M.-P.: Nemo: an agent-oriented software engineering methodology. In: OOPSLA Workshop on Agent Oriented Methodologies, Seattle (2002)Google Scholar
  11. 11.
    Jürjens, J.: UMLsec: extending UML for secure systems development. In: International Conference on the Unified Modeling Language, Dresden, Germany (2002)CrossRefGoogle Scholar
  12. 12.
    Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: International Conference on the Unified Modeling Language, Dresden, Germany (2002)CrossRefGoogle Scholar
  13. 13.
    Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE J. Mag. 29(2), 38–47 (1996)Google Scholar
  14. 14.
    Xiao, L., Peet, A., Lewis, P., Dashmapatra, S., Saez, C., Croitoru, M., Vicente, J., Gonzalez-Velez, H., Ariet, M.L.I.: An adaptive security model for multi-agent systems and application to a clinical trials environment. In: IEEE Annual International Computer Software and Applications Conference Volume II, pp. 261–268. IEEE Computer Society (2007)Google Scholar
  15. 15.
    Beydoun, G., Low, G.C., Mouratidis, H., Henderson-Sellers, B.: Modelling MAS_specific security features. In: International Conference on Advanced Information Systems Engineering, Trondheim, Norway (2007)Google Scholar
  16. 16.
    Beydoun, G., Low, G.C., Mouratidis, H., Henderson-Sellers, B.: A security-aware metamodel for multi-agent systems (MAS). Inf. Softw. Technol. 51(5), 832–845 (2009)CrossRefGoogle Scholar
  17. 17.
    Zrari, C., Hachicha, H., Ghedira, K.: Agent’s security during communication in mobile agents system. In: KES 2015, Singapore (2015)CrossRefGoogle Scholar
  18. 18.
    Hachicha, H., Loukil, A., Ghedira, K.: MA-UML: a conceptual approach for mobile agents’ modelling. Int. J. Agent-Oriented Softw. Eng. 3(2/3), 277–305 (2009)CrossRefGoogle Scholar
  19. 19.
    Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: JADE: a software framework for developing multi-agent applications. Lessons learned. Inf. Softw. Technol. 50(1-2), 10–21 (2008)CrossRefGoogle Scholar
  20. 20.
    Jade Security Guide (2005). http://jade.cselt.it/doc/tutorials/JADE_Security.pdf. Accessed 05 Dec 2017
  21. 21.

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Donies Samet
    • 1
    Email author
  • Farah Barika Ktata
    • 2
  • Khaled Ghedira
    • 3
  1. 1.ENSITunisTunisia
  2. 2.ISSATSousseTunisia
  3. 3.ISG TunisTunisTunisia

Personalised recommendations