CFP last date
20 January 2025
Reseach Article

A Reliable Protection Architecture for Mobile Agents in Open Network Systems

by Ibharalu Friday Thomas, Sofoluwe Adetokunbo Babatunde, Akinwale Adio Taofiki
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 17 - Number 7
Year of Publication: 2011
Authors: Ibharalu Friday Thomas, Sofoluwe Adetokunbo Babatunde, Akinwale Adio Taofiki
10.5120/2234-2854

Ibharalu Friday Thomas, Sofoluwe Adetokunbo Babatunde, Akinwale Adio Taofiki . A Reliable Protection Architecture for Mobile Agents in Open Network Systems. International Journal of Computer Applications. 17, 7 ( March 2011), 6-14. DOI=10.5120/2234-2854

@article{ 10.5120/2234-2854,
author = { Ibharalu Friday Thomas, Sofoluwe Adetokunbo Babatunde, Akinwale Adio Taofiki },
title = { A Reliable Protection Architecture for Mobile Agents in Open Network Systems },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 17 },
number = { 7 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 6-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume17/number7/2234-2854/ },
doi = { 10.5120/2234-2854 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:57.091188+05:30
%A Ibharalu Friday Thomas
%A Sofoluwe Adetokunbo Babatunde
%A Akinwale Adio Taofiki
%T A Reliable Protection Architecture for Mobile Agents in Open Network Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 17
%N 7
%P 6-14
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile-agent system is one where user programs (the agent) may voluntarily and autonomously migrate from one computer (the host) to another (the mobile agent server). A large deployment of mobile agent systems is not possible without satisfying security architecture. The major obstacle facing wide deployment of mobile agents is the attack of a visiting code by a malicious host. The fact that host computers have complete control over all the programs of a visiting agent makes it very hard to protect agents from un-trusted hosts. This has resulted to restricted deployment of mobile agents to known hosts in closed networks where the security of the agents is guaranteed. However, this restriction negates the original major concept of autonomy on which mobile agent technology is established. In this paper we propose dynamic protection architecture for mobile agents systems, using Travel Diary Protection Scheme and Platform Registry. The scheme protects and allows mobile agents to roam freely in open networks environment without being compromised in a malicious hosts.

References
  1. Wahbe R., S, Lucco, T.E. Anderson and Graham S.L., 1993, Efficient Software Based Fault Isolation, In Proceedings of the 14th ACM Symposium on Operating Systems Principle, pp 203-216, ACM
  2. Jacob Y. Levy, John K. Ousterbhout and Brent B Welch, 1997, The safe Tcl Security Model Technical Report, Sun Microsystems
  3. Sreekanth V., S Ramchandram and A. Govardhan, 2010, Mobile Agent Security and Key Management Technique, Journal of Computing, Vol. 2, Issue 9, ISSN 2151-9617
  4. Neelesh Kumar Panthi and Chaudhari Neelesh Kumar Panthi, 2010, Securing Mobile Agent using Dummy and Monitoring Mobile Agent, International Journal of Computer Science and Information Technologies, Vol 1 (4), pp 208-211
  5. Sarvarnl Islam Rizvi, Zinat Sultana, Bio Sun and Mid Washiqul Islam, 2010, Security of Mobile Agent in Ad Hoc Network using Threshold Cryptography, World Academy of Science, Engineering and Technology, Vol 30, pp 424-427
  6. Sreekanth V., Ranchandra S., and Gavardhan A., 2008, A Novel Approach for Securing and Integrity of Mobile Agents, ICCBN, IISC, Bangalore
  7. Tomas Sander and Christian F. Tschudin, 1998, Protecting Mobile Agent against Malicious Hosts, In Giovanni Vigna, Mobile Agent Security, pp. 44-60, Springer-Verlag, Herdeberg Germany
  8. Gray R.S., 1995, A Transportable Agent System, In proceedings of CIKM 95 Workshop on Intelligent Information Agents
  9. Dierks T. and Rescorla E., 2006, The Transport Layer Security Protocol Version, In RFC 4344, IETF
  10. Vigna G., 1998, Cryptographic Traces for Mobile Agents, In Mobile Agent and Security, Vol., 1419 of Lecture Notes in Computer Science, pp 137-153, Springer Verlag Hohl F., 1998, Time Limited Blackbox Security: Protecting Mobile Agent from Malicious Hosts, In Mobile Agent and Security, Vol., 1419 of Lecture Notes in Computer Science, pp 92-113, Springer Verlag
  11. Sander T. and Tschudin C.F., 1998, Protecting Mobile Agents against Malicious Host, In Mobile Agent and Security, Vol., 1419 of Lecture Notes in Computer Science, Springer Verlag
  12. Tan H.K. and Morean L 2001, Trust Relationships in a Mobile Agent System, In Mobile Agent, Vol., 2240 of Lecture Notes in Computer Science, pp 15-30, Springer Verlag
  13. Carles Garrigne Ollivera Bellaterra, 2008, Contribution to Mobile Agent Protection, PhD Thesis, Universtat Ant Onoma, De Barcelona
  14. Wikipedia the Free Encyclopedia Serialization, http://en.wikipedia.org/wiki/serialization
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Agents Security Travel Diary Platform Registry