INTER-CONFIDENTIALITY PROTECTION OF AGENT COMMUNICATION IN MULTI-AGENT SYSTEM BASED APPLICATIONS

2015 ◽  
Vol 77 (13) ◽  
Author(s):  
Olumide Simeon Ogunnusi ◽  
Shukor Abd Razak ◽  
Abdul Hanan Abdullah

Mobile agent interaction is usually vulnerable to attacks from within and outside the agent’s execution environment. Also, the mobility property of mobile agents earns them the opportunity to migrate from one security domain to another. Intranet/LAN with connection to internet do, from time to time, experience agent visitation either for malicious purpose or for legitimate mission. To protect legitimate agent communication against attack by visiting agent, we propose a technique that restricts migration of the visiting agent and isolate it to a neutral host where its mission could be achieved. We refer to this technique as restriction-based access control mechanism (ResBAC). The proposed mechanism employs certificate authentication, re-defining visiting agent itinerary path and visiting agent isolation to accomplish the aforementioned objective. The performance of the proposed mechanism is evaluated using scenarios to determine the strength of the mechanism in term of its ability to protect agent communication against the three major threats: man-in-the-middle attack, replay attack, and passive eavesdropping. 

2017 ◽  
Vol 13 (1) ◽  
pp. 155014771668484 ◽  
Author(s):  
Huthiafa Q Qadori ◽  
Zuriati A Zulkarnain ◽  
Zurina Mohd Hanapi ◽  
Shamala Subramaniam

Recently, wireless sensor networks have employed the concept of mobile agent to reduce energy consumption and obtain effective data gathering. Typically, in data gathering based on mobile agent, it is an important and essential step to find out the optimal itinerary planning for the mobile agent. However, single-agent itinerary planning suffers from two primary disadvantages: task delay and large size of mobile agent as the scale of the network is expanded. Thus, using multi-agent itinerary planning overcomes the drawbacks of single-agent itinerary planning. Despite the advantages of multi-agent itinerary planning, finding the optimal number of distributed mobile agents, source nodes grouping, and optimal itinerary of each mobile agent for simultaneous data gathering are still regarded as critical issues in wireless sensor network. Therefore, in this article, the existing algorithms that have been identified in the literature to address the above issues are reviewed. The review shows that most of the algorithms used one parameter to find the optimal number of mobile agents in multi-agent itinerary planning without utilizing other parameters. More importantly, the review showed that theses algorithms did not take into account the security of the data gathered by the mobile agent. Accordingly, we indicated the limitations of each proposed algorithm and new directions are provided for future research.


2014 ◽  
Vol 519-520 ◽  
pp. 1239-1242
Author(s):  
Xiao Hu Yu

An improved congestion control mechanism based on mobile agent for wireless sensor networks is proposed, which includes node-level congestion and link-level congestion control. The formers congestion information is collected and distributed by mobile agents (MA). When mobile agent travels through the networks, it can select a less-loaded neighbor node as its next hop and update the routing table according to the nodes congestion status. Minimum package of node outgoing traffic was preferentially transmitted in the link-level congestion. Simulation result shows that proposed mechanism attains high delivery ratio and throughput with reduced delay when compared with the existing technique.


2011 ◽  
Vol 65 ◽  
pp. 251-254 ◽  
Author(s):  
Bo Sun ◽  
Hua Chen

With widely applications of Multi-Agent System (MAS) on internet and intranet, how to ensure security regarding multi-agent communication is a big issue. Traditional cryptographic technologies support a coarse granularity security. This paper adopts XML security technology to provide a security mechanism for MAS communication. With the combination of XML security specifications and MAS, the paper presents a fine-grained security model for MAS communication. The model proposed can satisfy the security requirements of MAS communication based on XML data format.


Author(s):  
Yu-Cheng Chou ◽  
David Ko ◽  
Harry H. Cheng

Agent technology is emerging as an important concept for the development of distributed complex systems. A number of mobile agent systems have been developed in the last decade. However, most of them were developed to support only Java mobile agents. Furthermore, many of them are standalone platforms. In other words, they were not designed to be embedded in a user application to support the code mobility. In order to provide distributed applications with the code mobility, this article presents a mobile agent library, the Mobile-C library. The Mobile-C library is supported by various operating systems including Windows, Unix, and real-time operating systems. It has a small footprint to meet the stringent memory capacity for a variety of mechatronic and embedded systems. This library allows a Mobile-C agency, a mobile agent platform, to be embedded in a program to support C/C++ mobile agents. Functions in this library facilitate the development of a multi-agent system that can easily interface with a variety of hardware devices.


Author(s):  
MARIO KUSEK ◽  
KRESIMIR JURASOVIC ◽  
GORDAN JEZIC

This paper deals with the verification of a multi-agent system simulator. Agents in the simulator are based on the Mobile Agent Network (MAN) formal model. It describes a shared plan representing a process which allows team formation according to task complexity and the characteristics of the distributed environment where these tasks should be performed. In order to verify the simulation results, we compared them with performance characteristics of a real multi-agent system, called the Multi-Agent Remote Maintenance Shell (MA–RMS). MA–RMS is organized as a team-oriented knowledge based system responsible for distributed software management. The results are compared and analyzed for various testing scenarios which differ with respect to network bandwidth as well as task and network complexity.


Author(s):  
Najmus Saqib Malik ◽  
David Ko ◽  
Harry H. Cheng

This paper describes a secure migration process of mobile agents between agencies. Mobile-C is an IEEE Foundation for Intelligent Physical Agents (FIPA) standard compliant multi-agent platform for supporting C/C++ mobile and stationary agents. This secure migration process is inspired from Secure Shell (SSH). Before migration, both agencies authenticate each other using public key authentication. After successful authentication, an encrypted mobile agent is transferred and its integrity is verified. Mobile-C is specially designed for mechatronic and factory automation systems where, for correct system operations, agencies must accept mobile agents from trusted agencies. For this reason, the emphasis is on strong authentication of both agencies involved in migration process. Security aspects of other popular mobile agent systems are described briefly. A comparison study with SSH protocol is performed and future work is elaborated.


Author(s):  
HAIPING XU ◽  
ZHIGUO ZHANG ◽  
SOL M. SHATZ

Security modeling for agents has been one of the most challenging issues in developing practical mobile agent software systems. In the past, researchers have developed mobile agent systems with emphasis either on protecting mobile agents from malicious hosts or protecting hosts from malicious agents. In this paper, we propose a security based mobile agent system architecture that provides a general solution to protecting both mobile agents and agent hosts in terms of agent communication and agent migration. We present a facilitator agent model that serves as a middleware for secure agent communication and agent migration. The facilitator agent model, as well as the mobile agent model, is based on agent-oriented G-nets — a high level Petri net formalism. To illustrate our formal modeling technique for mobile agent systems, we provide an example of agent migration to show how a design error can be detected.


Sign in / Sign up

Export Citation Format

Share Document