Security in computing
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Mobile agent technology in support of sales order processing in the virtual enterprise
BASYS '98 Proceedings of the 3rd IEEE/IFIP international conference on Intelligent systems for manufacturing : multi-agent systems and virtual organizations: multi-agent systems and virtual organizations
An Architecture of Electronic Market Applying Mobile Agent Technology
ISCC '98 Proceedings of the Third IEEE Symposium on Computers & Communications
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Self-reliant mobile code: a new direction of agent security
Journal of Network and Computer Applications
Hi-index | 0.24 |
Many areas such as electronic commerce, network management and information retrieval can benefit from the application of mobile agents technologies. The exploitation of mobile agents offers several advantages such as reduction of network latency, asynchronous execution, fault-tolerant behavior. However, a wider use of mobile agents is currently limited by the lack of a comprehensive security framework that can address the security concerns, especially the protection of mobile agents from malicious hosts. This paper presents a protocol that protects a mobile agent against attacks from malicious hosts, for electronic commerce applications. We used the reference execution concept by executing, in parallel to the mobile agent execution, its clone on trusted servers. This protocol protects a mobile agent from its code, its execution flow, its data and its itinerary modifications. Moreover, these attacks are detected almost in real time, the malicious hosts are identified and the protocol continues its execution transparently to the user.