Open Access Open Access  Restricted Access Subscription or Fee Access

Integrating Security Model for Introducing Advanced Security in Mobile Agents

Rajan Sahota, Ramandeep Kaur

Abstract


A mobile agent is a software program that can migrate from host to host to collect information on behalf of its owner. With the concept of mobile agent, the execution process will go to the place where the data are available, data will not send to the place of execution process. However, it has not become popular due to some problems such as security, fault tolerance etc. The fact that computers have complete control over all the programs makes it very hard to protect mobile agents from untrusted hosts. So, the issue of protecting a mobile agent from a malicious host is a more difficult problem than protect a host from a malicious agent. This paper proposes advanced security model for the mobile agent security against malicious hosts by combining few techniques so that it can provide a better solution.

Keywords


Security, Mobile Agents, Mobile Code, Malicious Host.

Full Text:

PDF

References


A. Corradi, R. Montanari,” Security Issues in mobile agents Technology”, IEEE Internet Computing, Vol. 1, 1999.

T. Taka Tadanori, M. Takashi Watanabe,” A Model of mobile agents Services Enhanced for Resource Restrictions and Security”, IEEE Internet Computing, 1995.

H. Lee, ”The Use of Encrypted Functions for mobile agent Security”, Proceedings of the 37th Hawaii International Conference on System Sciences, 2004.

T. Sander, C. Tschudin, “Protecting mobile agents Against Malicious Hosts”, In G. Vigna, editor, mobile agent Security, pages 44–60. Springer Verlag: Heidelberg, 1998.

B. Yee, ”Using Secure Coprocessors”, PhD thesis, Carnegie Mellon University, 1994.

X. D. Guan, Y. L. Yang, and J. Y. You, “POM - A Security Model against Malicious Hosts”, DCTC Tech Report, IEEE Computer Society, Shanghai Jiaotong Univ. Dec. 2000.

N. Karnik, “Security in mobile agent Systems” PhD Thesis, Department of Computer Science and Engineering, University of Minnesota, 1998.

L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, S. Schwab, and P. LeBlanc, "Self- Protecting mobile agents Obfuscation Report", Network Associates Laboratories, June 2003.

A. Young, M. Yung, "Encryption Tools for mobile agents: Sliding Encryption," In: E. BIHAM (ed), Fast Software Encryption, Springer-Verlag, Germany, 1997.

G. Karjoth, J. Posegga, "Mobile agents and Telcos' Nightmares," Annales des Telecommunications VoL 55, No. 7/8, 29-41, 2000.

G. Vigna, "Protecting mobile agents Through Tracing," Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvalskylä, Finland, June 1997.

J. Riordan, B. Schneier, “Environmental Key Generation Towards Clueless Agents,” G. Vinga (Ed.), Mobile agents and Security, Springer-Verlag, Lecture Notes in Computer Science No. 1419, 1998.

Yan Li, Min Fu, Lina Yu, “E-Commerce Security Model Construction Based on Mobile Agent”, IEEE International Conference on Networking and Digital Society, 2010.

V. Roth, "Secure Recording of Itineraries Through Cooperating Agents," Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pp. 147-154, INRIA, France, 1998.

B. Yee, "A Sanctuary for mobile agents," DARPA Workshop on Foundations for Secure Mobile Code, Feb. 1997.

G. Karjoth, N. Asokan, and C. Glc, "Protecting the Computation Results of Free- Roaming Agents", Second International Workshop on mobile agents, Stuttgart, Germany, Sep. 1998.

G. Wroblewski, "General Method of Program Code Obfuscation", PhD Dissertation, Wroclaw University of Technology, Institute of Engineering Cybernetics, 2002.

F. Hohl, "Time Limited Blackbox Security: Protecting mobile agents from Malicious Hosts," To appear in mobile agents and Security Book edited by Giovanni Vigna, published by Springer Verlag 1998.

B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang, "On the (Im)possibility of Obfuscating Programs," in Advances in Cryptology, Proceedings of Crypto'2001, Lecture Notes in Computer Science, Vol. 2139, pages 1-18.

G. Hachez, "A Comparative Study of Software Protection Tools Suited for Ecommerce with Contributions to Software Watermarking and Smart Cards," Universite Catholique de Louvain, 2003.

C. Collberg, C. Thomborson, and D. Low, "A taxonomy of obfuscating transformations," Technical Report 148, Department of Computer Science, University of Auckland, July 1997.

W. Jansen, T. Karygiannis, "Mobile agent Security," NIST Special Publication 800-19, National Institute of Standard and Technology, 2000.

Wayne A. Jansen, “Countermeasures for Mobile Agent Security” March 01, 2010.

S. Armoogum, A. Caully,” Obfuscation Techniques for Mobile Agent code confidentiality”, March 2010.

S. Srivastava, G.C Nandi, ” Detection of Mobile Agent’s blocking in Secure Layered Architecture”, IEEE International Conference on Communication Systems and Network Technologies, 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.