A Secure Communication in Mobile Agent System

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2013 by IJETT Journal
Volume-6 Number-4
Year of Publication : 2013
Authors : Maryam Mahmoodi , Mohammad Mahmoodi Varnamkhasti

Citation 

Maryam Mahmoodi , Mohammad Mahmoodi Varnamkhasti. "A Secure Communication in Mobile Agent System". International Journal of Engineering Trends and Technology (IJETT). V6(4):186-188 Dec 2013. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

A mobile agent is a software code with mobility which can be move from a computer into another computers through network. The mobile agent paradigm provides many benefits in developments of distributed application at the same time introduce new requirements for security issues with these systems. In this article we present a solution for protection agent from other agents attacks with loging patterns of malicious agent and useing this log for communication. We implemented our resolution by JADE.

References

[1] P. Dadhich, K.Dutta, M.C.Govil, "Security Issues in Mobile Agents", International Journal of Computer Applications (0975 – 8887)Volume 11– No.4, December 2010.
[2] W.Jansen, T.Karygiannis, "Mobile Agent Security" , NIST Special Publication 800-19, [3] Colin G. Harrison, David M. Chess, and Aaron Kershenbaum, “Mobile Agents: Are they a good idea?”, technical report, 1995, IBM Research Division.
[4] Chess, D.M: Security issues in mobile code systems. In : mobile agents and security, Editor Vigna, vol. LNCS1419. Springer-Verlag 1998.
[5] Ahmed S. Mohamed & D. Fakhry, Security in Mobile Agent Systems. In proceedings of the 2002 Symposium on Applications and the Internet, pgs 4-5, Washington, DC, USA,2002, IEEE Computer Society.
[6] B. Yee. Using Secure Coprocessors . Ph.D thesis , Carnegie Mellon University. 1994.
[7] U. G. Wilhelm,” A Technical Approach to Privacy based on mobile Agents Protected by Tamper-resistant Hardware”, PhD Theses nr. 1961. Dept. of D’Informatique, Ecole polytechnique Federale de Lausanne,1999.
[8] J.Algesheimer et al.,”Cryptographic Security for Mobile Code,”Proc.2001 IEEE Symp. Security andPrivacy, IEEE Press,2001
[9] Giovanni Vigna, "Protecting Mobile Agents Through Tracing," Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvälskylä, Finland, June 1997.
[10] Neeran M. Karnik and Anand R. Tripathi. Security in the Ajanta mobile agent system. Software Practice and Experience, 31(4):301–329, 2001.
[11] Chess David M. Security issues in mobile code systems. In Mobile Agents and Security, volume 1419, pages 1–14. Springer Verlag, 1998.
[12] J. Mir and J. Borrell. Protecting mobile agent itineraries. In Mobile Agents for Telecommunication Applications (MATA), volume 2881 of Lecture Notes in Computer Science, pages 275–285. Springer Verlag, October 2003.
[13] S. Robles, J. Mir, and J. Borrell. Marism-a: An architecture for mobile agents with recursive itinerary and secure migration. In 2nd. IW on Security of Mobile Multiagent Systems, Bologna, July 2002.
[14] V. Roth. Empowering mobile software agents. In Proc. 6th IEEE Mobile Agents Conference, volume 2535 of Lecture Notes in Computer Science, pages 47–63. Spinger Verlag, 2002.

Keywords
mobile agent; security; mobility; agent security