CFP last date
20 December 2024
Reseach Article

Article:Security Issues in Mobile Agents

by Priyanka Dadhich, Dr.Kamlesh Dutta, Dr. M.C.Govil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 4
Year of Publication: 2010
Authors: Priyanka Dadhich, Dr.Kamlesh Dutta, Dr. M.C.Govil
10.5120/1574-2104

Priyanka Dadhich, Dr.Kamlesh Dutta, Dr. M.C.Govil . Article:Security Issues in Mobile Agents. International Journal of Computer Applications. 11, 4 ( December 2010), 1-7. DOI=10.5120/1574-2104

@article{ 10.5120/1574-2104,
author = { Priyanka Dadhich, Dr.Kamlesh Dutta, Dr. M.C.Govil },
title = { Article:Security Issues in Mobile Agents },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 11 },
number = { 4 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume11/number4/1574-2104/ },
doi = { 10.5120/1574-2104 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:59:41.946187+05:30
%A Priyanka Dadhich
%A Dr.Kamlesh Dutta
%A Dr. M.C.Govil
%T Article:Security Issues in Mobile Agents
%J International Journal of Computer Applications
%@ 0975-8887
%V 11
%N 4
%P 1-7
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Software security to protect mobile agent consists of lots of aspects like cryptography, access control and trust management, intrusion detection and tamper resistance, authentication and privacy, signature schemes, e-commerce, security analysis, mobile computing security etc. So, to design and develop security mechanisms for mobile agents against malicious hosts this paper identifies different kinds of attacks and relationships between them. Security objectives and requirements are analyzed with security measures taken to protect mobile code, state and data.

References
  1. "Designing Autonomous Agents,pgs 49-70,The MIT Press:Cambridge,MA,!990.P.Maes:Situated agents can have goals.
  2. A.S.Rao and M.P.Georgeff. a model-theoretic approach to the verification of situated reasoning systems. In proceedings of thirteeth International Conference on AI(IJCAI-93)pg 318-324,Chambery,France,1993.
  3. SHOHAM.Y.:’Agent-oriented programming’,Artificial Intelligence 1993,60(1)pp,51-92.
  4. S.Franklin and A.Graesser. Is it a agent or just a program? In J.P.Muller,M.Wooldridge and N.R. Jennings,editors,Intelligent Agents III(LNAI Volume 1193).Springer-Verlag:Berlin,Germany,1997,pp.21-36.
  5. S.Kraus,J.Wilkenfield and G.Zlotkin. Multiagent negotiation under time constraints.Artificial Intelligence.vol.75(2)pp.297-345,1995.
  6. GENESERETH,M.R. and KETCHPEL,’software agents ’,commun,ACM,1994,(7),pp 48-53.
  7. S.Russell and P.Norvig. Artificial Intelligence:A Modern Approach,Prentice-Hall,1995.
  8. Joris Claessens, Bart Preneel, Joos Vandewalle , “(How) Can Mobile Agents Do Secure Electronic Transactions On Untrusted Hosts? A Survey Of The Security Issues and The Current Solutions”, pp. 38-41, ACM Transactions on Internet Technology, Vol. 3, No. 1, February 2003.
  9. J. Vitek,M. Serrano and D.Thanols. “Security and Communication in Mobile Object Systems,”Mobile Object Systems: Toward the programmable Internet, J. Vitek and C.Tschudin, Eds ., Springer-Verlag, 1997.
  10. Sergi Robles, Mobile Agent system and Trust, a combined View toward Secure Sea-Data applications. July 2002. Http://www.tdx.cesca.es/TESIS_UAB/AVAILABLE/TDX-1128102-173916//srmldel.pdf
  11. U. G. Wilhelm,” A Technical Approach to Privacy based on mobile Agents Protected by Tamper-resistant Hardware”, PhD Theses nr. 1961. Dept. of D’Informa-tique, Ecole polytechnique Federale de Lausanne,1999.URL: http:// lsewww.epfl.ch/~wilhelm/Papers/thesis.pdf.
  12. . B. Yee. Using Secure Coprocessors . Ph.D thesis , Carnegie Mellon University. 1994.
  13. Zachary ,John.2003. Protecting Mobile Code in the Wild . Internet Computing, IEEE,7(2).
  14. Wu, Xiaoping ; Shen, Zhidong; and Zhang, Huanguo.2006. The Mobile Agent Security Enhanced by Trusted Computed Technology, Proceedings of Int. Conf. ,pp. 1-4.
  15. Schelderup, K.olnes, J: Mobile agent security-Issues and Directions. In: Proceedings of the 6th Int. Conf. on intelligence and services in networks Barcelona, Spam, Apr 1999.
  16. Thmed S. Mohamed & D. Fakhry, Security in Mobile Agent Systems. In proceedings of the 2002 Symposium on Applications and the Internet, pgs 4-5, Washington, DC, USA,2002, IEEE Computer Society.
  17. Butscgje, L.; Paprzycki, M.; and Ren, M.2004. Mobile agent security-an overview, In E. Niedzielska et al (eds), Modern information Technologies in Management Wroclaw Univ. of Economics Press,pp.600-608.
  18. T. Sander and C. F. Tschudin, “Protecting Mobile Agents Against Malicious Hosts”. G. Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS, pp. 44–60. Springer-Verlag, June 1998.
  19. Ma ,L., and Tsai, J. J.P., “Attacks and countermeasures in software system security,”Handbook of Software Engineering and Knowledge Engineering, “.
  20. X. D. guan, Y.L. Yang and J. Y. You, “POM- A Security Model against Malicious hosts”, DCTC Tech Report, Shanghai jiaotong Univ. Dec 1999
  21. J. Guttman and V. Swarup . Authentication for Mobile agent . In LNCS, pgs 114-136. Springer 1998.
  22. William M.Farmer, Joshua D. Guttman, and Vipin Swarup, “Security for Mobile Agents: Authentication and State Appraisal”, pp. 5-11, pp. 118-130, 1996 European Symposium on Research in Computer Security (ESORICS).
  23. Ahmed S. Mohamed & D. Fakhry, Security in Mobile Agent Systems. In proceedings of the 2002 Symposium on Applications and the Internet, pgs 4-5, Washington, DC, USA,2002, IEEE Computer Society.
  24. C. Meadows. Detecting attacks on mobile agents. In proceedings of 1997 foundations for secure mobile code workshop, pgs 64-65, Monterey, CA, March 1997, position paper.
  25. Dan S. Wallach. A new approach to mobile code security. Ph.D thesis, dept. of CS, Univ. of Princeton, Jan 1999.
  26. N.Karnik, Security in Mobile Agent Systems. Ph.D thesis, dept. of CS&E Univ. of Minnesota.
  27. Bennet S. Yee. A Sanctuary for Mobile Agents. In J. Vitek and C. Jensen, editors, Secure Internet Programming volume 1683 of LNCS, pgs 261-273, Springer- Verlag, Berlin Heidelberg New York, 1999.
  28. Colin G. Harrison, David M. Chess, and Aaron Kershenbaum, “Mobile Agents: Are they a good idea?”, technical report, 1995, IBM Research Division.
  29. Mousa Alfalayleh and Lijiljana Brankovic, “An Overview of Security Issues and Techniques in Mobile Agents”, The School of Electrical Engineering and Computer Science, The University of Newcastle, Newcastle, NSW 2308, Australia.
  30. W. Jansen and T. Karygiannis, “Mobile Agent Security “, Nist Special Publication 800-19 -, 2000. National Institute of Standards Technology
  31. J.Algesheimer et al.,”Cryptographic Security for Mobile Code,”Proc.2001 IEEE Symp. Security and Privacy, IEEE Press,2001
  32. P.Stone and M.Veoso.Multiagent systems:A survey from the machine learning perspective.IEEE transactins on knowledge and data engineering ,Forthcoming,1998.
  33. M.P.Georgeff .Communication and Interaction in Multi-Agent planning. In Proceedings of the Third National conference on Artificial Intelligence(AAAI-83),Washington,D.C.,1983,pp 125-129.
  34. D.R.Kuokka and L.P.harada.Issues and extensions for information matchmaking protocols. International Journal of Cooperative Information Systems,vol5(2-3)pp. 251-274,1996.
  35. Chess, D.M: Security issues in mobile code systems. In : mobile agents and security, Editor Vigna, vol. LNCS1419. Springer-Verlag 1998.
  36. U. G. Wilhelm,” A Technical Approach to Privacy based on mobile Agents Protected by Tamper-resistant Hardware”, PhD Theses nr. 1961. Dept. of D’Informa-tique, Ecole polytechnique Federale de Lausanne,1999.URL
  37. T.R.Gruber. A translation approach to portable ontologies. Knowledge acquisition,vol.5(2) pp.199-220,1993.
  38. The Foundation for Intelligent Physical Agents.See http://drogo.cselt.it/fipa/.
  39. M.WOOLDRIDGE(1997)”Agent-Based software engineering”IEEE PROC. On Software Engineering,144(1)26-37.
  40. Ma ,L., and Tsai, J. J.P., “Attacks and countermeasures in software system security,”Handbook of Software Engineering and Knowledge Engineering
  41. A. Lingnau, O. Drobnik et al. An Infrastructure for Mobile Agents: Requirements and Architecture. 1995.
  42. K.P.Sycara.Resolving goal conflicts via negotiation. In Proceedings of Seventh National Conference on Artificial Intelligence(AAAI-88)St.Paul,MN,1988.
  43. Butscgje, L.; Paprzycki, M.; and Ren, M.2004. Mobile agent security-an overview, In E. Niedzielska et al (eds), Modern information Technologies in Management Wroclaw Univ. of Economics Press,pp.600-608.
  44. Borselius, N: Mobile agent security. Electron. Communication Engineering. IEEE London 14(5),211-218(2002)
  45. R.S. Gray. A flexible and secure mobile agent system. 4th Annual Tcl/Tk Workshop Proc,1996.
  46. G. Vigna. Crypograhic traces for mobile agents. In Giovanni Vigna, editor, mobile agents systems, vol.1419 of mobile agents and security, pgs 137-153, Springer-Verlag Berlin Heidelberg New York, 1998.
  47. WOOLDRIDGE,M. and JENNINGS. N.R.:’Intelligent agents :theory and practise’.Knowl.Eng.Rev.,1995,10, 20,pp.115-152.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography access control trust management intrusion detection authentication privacy signature schemes e-commerce