Abstract
For getting instant access to the data at one place, the software called ‘Mobile Agent’ is used, which moves from host to host and brings back the information required. With advancement in technology, access to information has become more and more easy, but it also brings certain concerns about the security of systems involved in the process and the data being used or taken. This paper is concerned with the security threats that a mobile agent system could experience and solutions that have been proposed for securing the mobile agent system. There are many solutions proposed for security; some are simulation based while some are mathematical derivation based. Simulation-based models are more practical for solving the real-world scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gray, R. S.: Agent TCL: a flexible and secure mobile-agent system. In: Proceedings of the Fourth Annual Tcl/Tk Workshop (TCL) 96, pp. 9–23 Monterey, California, (1996)
Farmer, W.M., Guttman, J.D., Swarup, V. (1966) Security for mobile agents: Authentication and state appraisal. Proceedings of th 4th Europian Symposium on Research in Computer Security (ESORICS’96), Rome, Italy pp.118–130
Gong, L.: New security architectural directions for java extended abstract. In: Proceedings of IEEE COMPCON, pp. 97–102 San Jose, California, February (1997)
Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. In: SOSP’93: Proceedings of the fourteenth ACM symposium on operating systems principles. ACM, New York, pp. 203–216 (1993)
Jansen, W., Karygiannis, T.: Mobile agent security. In: Nist special publication 800-19 - (2000)
Wang, C., Zhang, F., Wang, Y.: Secure web transaction with anonymous mobile agent over internet. J. Comp.Sci. Technol. 18(1), 84–89 (2003)
W. M. Farmer, J. D. Guttman, V. Swarup, S. Wakid, J. Davis, (eds.), In: Security for mobile agents: Authentication and state appraisal, Proceedings of the 19th National Information Systems Security Conference, Vol. 2, pp. 591–597, Baltimore Convention Center, Baltimore, Maryland, Oct 22–25, (1996)
Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant agents for mobile computing. IEEE Pers. Commun. 2(5), 34–49 (1995)
Bellavista, P., Corradi, A., Montanari, R., Stefanelli, C.: A mobile computing middleware for location and context- aware internet data services. ACM Trans. Int. Technol. 6(4), 356–380 (2006)
Necula, G.C., Lee, P.: Safe kernel extensions without runtime checking. SIGOPS Oper. Syst. Rev. 30, 229–243 (1996)
Peine , H., Stolpmann, T.: The architecture of the platform for mobile agents. In: Proceedings of the First International Workshop on Mobile Agents. Springer-Verlag, London, pp. 50–61 (1997)
Hohl, F.: Time limited blackbox security: protecting mobile agents from malicious hosts. In: G.Vigna (ed.) Mobile Agents and Security, pp. 92–113. Springer-Verlag, London (1998)
Sander, T.: On cryptographic protection of mobile agents. In: Proceedings of the 1997 Workshop on Mobile Agents and Security. University of Maryland, Baltimore, USA Oct (1997)
Ma, L., Tsai, J.J.P., Deng, Y., Murata, T.: Extended elementary object system model for mobile agent security. In: Proceedings of World Congress on Integrated Design and Process Technology, pp. 169–178, (2003)
Ma, L., Tsai, J.J.P.: Formal modeling and analysis of a secure mobile-agent system. In: IEEE Trans. Systems, Man Cybern.- A: Syst. Humans. 38(1), pp.180–196 (2008)
Valk, R.: Petri Nets as token objects—an introduction to elementary object nets. In: Proceedings of 19th International Conference on Application and Theory of Petri Nets, vol. 1420, pp. 1–25. (1998)
Xudong Guan, Yiling Yang, Jinyuan You. POM – A mobile agent security model against malicious hosts. In Proc. HPC-Asia 2000, pp.1165-1166, Beijing, China, May 2000
Lei, S., Liu, J., Xiao, J.: A novel free-roaming mobile agent security mechanism by trusted computing technology. In: 2008 International Conference on Computer Science and Software Engineering 12–14 Dec Wuhan, China
Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211–218 (2002)
Dewi Agushinta, R., Suhendra, A.: Secure mobile agent system in peer-to-peer networks: a review of security mechanisms based on several security issues. In: Proceedings of IEEE World Congress on Software Engineering Xiamen, China, 19–21 May (2009)
Hasan, M.B., Prasad, P.W. C.: A review of security implications and possible solutions for mobile agents in e-commerce. In: 2009 Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009), 25–26 July 2009, Monash
Vigna, G.: Cryptographic traces for mobile agents. In: Mobile Agents and Security, pp. 137–153. Springer-Verlag (1998)
Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. In: G., Vigna (ed.) Mobile Agents and Security. LNCS 1419, pp. 15–24. Springer-Verlag, London April 1998
Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted computing: providing security for peer-to-peer networks. In: P2P’05: Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing, pp. 117–124. IEEE Computer Society, Washington, DC (2005)
Sander, T., Tschudin, C. F.: Protecting mobile agents against malicious hosts. In: Mobile Agents and Security, pp. 44–60. Springer-Verlag, London (1998)
Silva, L.M., Soares, G., Martins, P., Renato, C., Almeida, L., Stohr, N.: JAMES: a platform of mobile agents for the management of telecommunication networks. In: G. Vigna (ed.) Proceedings of IATA99 Stockholm, Sweden, Aug 1999
Binder, W., Roth, V.: Secure mobile agent system using java: where are we heading? In: Proceedings of Symposium of Applied Computing, pp. 115–119 Madrid, Spain (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Dayal, N., Aswathi, L.K. (2014). Solutions for Security in Mobile Agent System. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol 216. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1299-7_10
Download citation
DOI: https://doi.org/10.1007/978-81-322-1299-7_10
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1298-0
Online ISBN: 978-81-322-1299-7
eBook Packages: EngineeringEngineering (R0)