Security in the Ajanta mobile agent system
Software—Practice & Experience
Providing Reliable Agents for Electronic Commerce
TREC '98 Proceedings of the International IFIP/GI Working Conference on Trends in Distributed Systems for Electronic Commerce
Protecting Mobile Code in the Wild
IEEE Internet Computing
Strategies against Replay Attacks
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Monotonicity and Partial Results Protection for Mobile Agents
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 1
Securing dynamic itineraries for mobile agent applications
Journal of Network and Computer Applications
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
An XML standards based authorization framework for mobile agents
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Full mobile agent interoperability in an IEEE-FIPA context
Journal of Systems and Software
Promoting the development of secure mobile agent applications
Journal of Systems and Software
Fragment Transfer Protocol: An IEEE-FIPA based efficient transfer protocol for mobile agents
Computer Communications
The MP architecture: towards a secure framework for mobile agents
International Journal of Agent-Oriented Software Engineering
Hi-index | 0.00 |
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching an agent multiple times to a remote host, thus making it reexecute part of its itinerary. Current proposals aiming to address this problem are based on storing agent identifiers, or trip markers, inside agent platforms, so that future reexecutions can be detected and prevented. The problem of these solutions is that they do not allow the agent to perform legal migrations to the same platform several times. The aim of this paper is to address these issues by presenting a novel solution based on authorisation entities, which allow the agent to be reexecuted on the same platform a number of times determined at runtime. The proposed protocol is secure under the assumption that authorisation entities are trusted.