mobile agents security
Recently Published Documents


TOTAL DOCUMENTS

7
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

2013 ◽  
pp. 166-202
Author(s):  
Raja Al-Jaljouli ◽  
Jemal H. Abawajy

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.


Author(s):  
Raja Al-Jaljouli ◽  
Jemal H. Abawajy

Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of information the agents collect is a fundamental requirement for a trusted implementation of electronic business applications and trade negotiations. This chapter discusses the security protocols presented in the literature that aim to secure the data mobile agents gather while searching the Internet, and identifies the security flaws revealed in the protocols. The protocols are analyzed with respect to the security properties, and the security flaws are identified. Two recent promising protocols that fulfill the various security properties are described. The chapter also introduces common notations used in describing security protocols and describes the security properties of the data that mobile agents gather.


2005 ◽  
Vol 1 (3) ◽  
pp. 185-205
Author(s):  
Yan Wang ◽  
Vijay Varadharajan

In a distributed environment, where a large number of computers are connected together to enable the large-scale sharing of data and computing resources, agents, especially mobile agents, are the tools for autonomously completing tasks on behalf of their owners. For applications of large-scale mobile agents, security and efficiency are of great concern. In this paper, we present a fast binary dispatch model and corresponding secure route structures for mobile agents dispatched in parallel to protect the dispatch routes of agents while ensuring the dispatch efficiency. The fast binary dispatch model is simple but efficient with a dispatch complexity of O(log2n. The secure route structures adopt the combination of public-key encryption and digital signature schemes and expose minimal route information to hosts. The nested structure can help detect attacks as early as possible. We evaluated the various models both analytically and empirically.


Author(s):  
DIRK WESTHOFF

In the world of mobile agents, security aspects are being discussed extensively, with strong emphasis on how agents can be protected against malicious hosts and vice versa. While in recent years many research groups presented solutions offering protection schemes for hosts that receive and run un-trusted, possibly malicious agents, in the field of protecting the agent against malicious hosts, development seems to grow very slowly. This paper discusses a protocol for detecting modifications at the agent's binary code that, for a particular class of modifications, undoubtedly unmasks the attacking host. Furthermore, it is shown that in co-operation with a special kind of route protection in a lot of scenarios the protocol resists attacks from coaliting malicious hosts as well as from a single malicious host.


Sign in / Sign up

Export Citation Format

Share Document