Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 216))

Abstract

For getting instant access to the data at one place, the software called ‘Mobile Agent’ is used, which moves from host to host and brings back the information required. With advancement in technology, access to information has become more and more easy, but it also brings certain concerns about the security of systems involved in the process and the data being used or taken. This paper is concerned with the security threats that a mobile agent system could experience and solutions that have been proposed for securing the mobile agent system. There are many solutions proposed for security; some are simulation based while some are mathematical derivation based. Simulation-based models are more practical for solving the real-world scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gray, R. S.: Agent TCL: a flexible and secure mobile-agent system. In: Proceedings of the Fourth Annual Tcl/Tk Workshop (TCL) 96, pp. 9–23 Monterey, California, (1996)

    Google Scholar 

  2. Farmer, W.M., Guttman, J.D., Swarup, V. (1966) Security for mobile agents: Authentication and state appraisal. Proceedings of th 4th Europian Symposium on Research in Computer Security (ESORICS’96), Rome, Italy pp.118–130

    Google Scholar 

  3. Gong, L.: New security architectural directions for java extended abstract. In: Proceedings of IEEE COMPCON, pp. 97–102 San Jose, California, February (1997)

    Google Scholar 

  4. Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. In: SOSP’93: Proceedings of the fourteenth ACM symposium on operating systems principles. ACM, New York, pp. 203–216 (1993)

    Google Scholar 

  5. Jansen, W., Karygiannis, T.: Mobile agent security. In: Nist special publication 800-19 - (2000)

    Google Scholar 

  6. Wang, C., Zhang, F., Wang, Y.: Secure web transaction with anonymous mobile agent over internet. J. Comp.Sci. Technol. 18(1), 84–89 (2003)

    Google Scholar 

  7. W. M. Farmer, J. D. Guttman, V. Swarup, S. Wakid, J. Davis, (eds.), In: Security for mobile agents: Authentication and state appraisal, Proceedings of the 19th National Information Systems Security Conference, Vol. 2, pp. 591–597, Baltimore Convention Center, Baltimore, Maryland, Oct 22–25, (1996)

    Google Scholar 

  8. Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant agents for mobile computing. IEEE Pers. Commun. 2(5), 34–49 (1995)

    Article  Google Scholar 

  9. Bellavista, P., Corradi, A., Montanari, R., Stefanelli, C.: A mobile computing middleware for location and context- aware internet data services. ACM Trans. Int. Technol. 6(4), 356–380 (2006)

    Article  Google Scholar 

  10. Necula, G.C., Lee, P.: Safe kernel extensions without runtime checking. SIGOPS Oper. Syst. Rev. 30, 229–243 (1996)

    Google Scholar 

  11. Peine , H., Stolpmann, T.: The architecture of the platform for mobile agents. In: Proceedings of the First International Workshop on Mobile Agents. Springer-Verlag, London, pp. 50–61 (1997)

    Google Scholar 

  12. Hohl, F.: Time limited blackbox security: protecting mobile agents from malicious hosts. In: G.Vigna (ed.) Mobile Agents and Security, pp. 92–113. Springer-Verlag, London (1998)

    Google Scholar 

  13. Sander, T.: On cryptographic protection of mobile agents. In: Proceedings of the 1997 Workshop on Mobile Agents and Security. University of Maryland, Baltimore, USA Oct (1997)

    Google Scholar 

  14. Ma, L., Tsai, J.J.P., Deng, Y., Murata, T.: Extended elementary object system model for mobile agent security. In: Proceedings of World Congress on Integrated Design and Process Technology, pp. 169–178, (2003)

    Google Scholar 

  15. Ma, L., Tsai, J.J.P.: Formal modeling and analysis of a secure mobile-agent system. In: IEEE Trans. Systems, Man Cybern.- A: Syst. Humans. 38(1), pp.180–196 (2008)

    Google Scholar 

  16. Valk, R.: Petri Nets as token objects—an introduction to elementary object nets. In: Proceedings of 19th International Conference on Application and Theory of Petri Nets, vol. 1420, pp. 1–25. (1998)

    Google Scholar 

  17. Xudong Guan, Yiling Yang, Jinyuan You. POM – A mobile agent security model against malicious hosts. In Proc. HPC-Asia 2000, pp.1165-1166, Beijing, China, May 2000

    Google Scholar 

  18. Lei, S., Liu, J., Xiao, J.: A novel free-roaming mobile agent security mechanism by trusted computing technology. In: 2008 International Conference on Computer Science and Software Engineering 12–14 Dec Wuhan, China

    Google Scholar 

  19. Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211–218 (2002)

    Google Scholar 

  20. Dewi Agushinta, R., Suhendra, A.: Secure mobile agent system in peer-to-peer networks: a review of security mechanisms based on several security issues. In: Proceedings of IEEE World Congress on Software Engineering Xiamen, China, 19–21 May (2009)

    Google Scholar 

  21. Hasan, M.B., Prasad, P.W. C.: A review of security implications and possible solutions for mobile agents in e-commerce. In: 2009 Conference on Innovative Technologies in Intelligent Systems and Industrial Applications (CITISIA 2009), 25–26 July 2009, Monash

    Google Scholar 

  22. Vigna, G.: Cryptographic traces for mobile agents. In: Mobile Agents and Security, pp. 137–153. Springer-Verlag (1998)

    Google Scholar 

  23. Riordan, J., Schneier, B.: Environmental key generation towards clueless agents. In: G., Vigna (ed.) Mobile Agents and Security. LNCS 1419, pp. 15–24. Springer-Verlag, London April 1998

    Google Scholar 

  24. Balfe, S., Lakhani, A.D., Paterson, K.G.: Trusted computing: providing security for peer-to-peer networks. In: P2P’05: Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing, pp. 117–124. IEEE Computer Society, Washington, DC (2005)

    Google Scholar 

  25. Sander, T., Tschudin, C. F.: Protecting mobile agents against malicious hosts. In: Mobile Agents and Security, pp. 44–60. Springer-Verlag, London (1998)

    Google Scholar 

  26. Silva, L.M., Soares, G., Martins, P., Renato, C., Almeida, L., Stohr, N.: JAMES: a platform of mobile agents for the management of telecommunication networks. In: G. Vigna (ed.) Proceedings of IATA99 Stockholm, Sweden, Aug 1999

    Google Scholar 

  27. Binder, W., Roth, V.: Secure mobile agent system using java: where are we heading? In: Proceedings of Symposium of Applied Computing, pp. 115–119 Madrid, Spain (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neelam Dayal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Dayal, N., Aswathi, L.K. (2014). Solutions for Security in Mobile Agent System. In: Sathiakumar, S., Awasthi, L., Masillamani, M., Sridhar, S. (eds) Proceedings of International Conference on Internet Computing and Information Communications. Advances in Intelligent Systems and Computing, vol 216. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1299-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1299-7_10

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1298-0

  • Online ISBN: 978-81-322-1299-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics