On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)
Mobile Agents (MAs) are not fully adopted for implementing distributed system especially in e-commerce application. The main reason is the security issues associated with use of MAs. Providing integrity of execution is considered as the most challenging problem in MAs. Mobile agent Graph Head Sealing (MAGHS) is a technique that aims towards providing integrity of execution. This paper discusses the attacks that can be launched against MAGHS technique and how the security properties for MAs data integrity are fulfilled. We try to model the behavior of a malicious host by launching a series of passive attacks against mobile agent and then see to what extent the security properties for mobile agent can be achieved. The experimental results suggest that MAGHS framework can be used to protect the computations results of mobile agents.
KeywordsMobile Agent security Graph head Sealing execution integrity active attacks security properties malicious hosts
Unable to display preview. Download preview PDF.
- 3.Kannammal, A., Ramachandran, V., et al.: Reliable multiagent system for e-business applications. Academic Open Internet Journal 18 (2006)Google Scholar
- 4.Jonsson, E., Olovsson, T.: A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering 23(4) (1997)Google Scholar
- 5.Pleisch, S., Schiper, A.: Fault tolerant mobile agent execution. IEEE Transaction on Computers 52(2) (2003)Google Scholar
- 10.Khan, A., Niu, X., et al.: Mobile agent computation results protection with head sealing. IJCSES 2(1), 13–18 (2008)Google Scholar
- 11.Loureiro, S.: Mobile code protection. Ph.D thesis, ENST Paris / Institut Eurecom (2001)Google Scholar
- 12.Lin, H.-C., et al.: Protection of mobile agent data collection by using ring signature. In: Proceedings IEEE International Conference on Networking, Sensing & Control (2004)Google Scholar
- 13.McDonald, J.T., Yasinsac, A., et al.: Mobile agent data Integrity using multi-agent architecture. In: Proceedings of the (PDCS 2004), pp. 14–17 (2004)Google Scholar
- 17.Lange, D.B., Oshima, M.: Programming and deploying Java mobile agents with Aglets. Addison Wiley (1998)Google Scholar
- 19.Oppliger, R.: Contemporary Cryptography. Artech House Computer Security (2005)Google Scholar
- 20.Khan, A., Niu, X., Yong, Z.: A hybrid approach for mobile agent security using reversible watermarking and dynamic data structure. IJCSES 1(1), 48–53 (2007)Google Scholar
- 21.Khan, A., Niu, X., Yong, Z.: Protecting mobile agent computation results with reversible watermarking and digital signature. In: IEEE Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Security, Los Alamitos (2007)Google Scholar