JRes: a resource accounting interface for Java
Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Seven good reasons for mobile agents
Communications of the ACM
Security enhanced mobile agents
Proceedings of the 7th ACM conference on Computer and communications security
An agent-based approach for building complex software systems
Communications of the ACM
Agent-oriented software engineering: the state of the art
First international workshop, AOSE 2000 on Agent-oriented software engineering
Application and programming experience with the Ara mobile agent system
Software—Practice & Experience - Special issue: Mobile agent systems
Software—Practice & Experience - Special issue: Mobile agent systems
Software—Practice & Experience - Special issue: Mobile agent systems
IEEE Concurrency
An Agent-Based Environment for Rmote Diagnosis, Supervision and Control
ICSC '99 Proceedings of the 5th International Computer Science Conference on Internet Applications
Security Concepts and Implementation in the Ara Mobile Agent System
WETICE '98 Proceedings of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Concordia: An Infrastructure for Collaborating Mobile Agents
MA '97 Proceedings of the First International Workshop on Mobile Agents
An Experimental Study of Polylogarithmic, Fully Dynamic, Connectivity Algorithms
Journal of Experimental Algorithmics (JEA)
Computer
Mobile-C: a mobile agent platform for mobile C-C++ agents
Software—Practice & Experience
SSH, the Secure Shell: The Definitive Guide
SSH, the Secure Shell: The Definitive Guide
Efficiency of JADE agent platform
Scientific Programming - International Symposium of Parallel and Distributed Computing & International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogenous Networks
JADE: A software framework for developing multi-agent applications. Lessons learned
Information and Software Technology
Employ a mobile agent for making a payment
Mobile Information Systems
XML-based agent communication, migration and computation in mobile agent systems
Journal of Systems and Software
Analysis of mobile agents in network fault management
Journal of Network and Computer Applications
Outsourcer selection and order tracking in a supply chain by mobile agents
Computers and Industrial Engineering
Combating the bloated state problem in mobile agents based network monitoring applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
A3M: an agent architecture for automated manufacturing
Software—Practice & Experience
A mobile agent platform for distributed network and systems management
Journal of Systems and Software
C For Engineers & Scientists, An Interpretive Approach with Companion CD
C For Engineers & Scientists, An Interpretive Approach with Companion CD
Mobile agent-based computational steering for distributed applications
Concurrency and Computation: Practice & Experience
Information and Software Technology
Use of an intelligent agent for an e-commerce bargaining system
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
SP 800-19. Mobile Agent Security
SP 800-19. Mobile Agent Security
Business-to-Consumer Mobile Agent-Based Internet Commerce System (MAGICS)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Hi-index | 0.00 |
This article describes a decentralized secure migration process of mobile agents between Mobile-C agencies. Mobile-C is an IEEE Foundation for Intelligent Physical Agents (FIPA) standard compliant multi-agent platform for supporting C/C++ mobile and stationary agents. Mobile-C is specially designed for mechatronic and factory automation systems where malicious agents may cause physical damage to machinery and personnel. As a mobile agent migrates from one agency to another in an open network, the security concern of mobile agent systems should not be neglected. Security breaches can be minimized considerably if an agency only accepts mobile agents from agencies known and trusted by the system administrator. In Mobile-C, a strong authentication process is used by sender and receiver agencies to authenticate each other before agent migration. The security framework also aims to guarantee the integrity and confidentiality of the mobile agent while it is in transit. This assures that all agents within an agency framework were introduced to that framework under the supervision and permission of a trusted administrator. The Mobile-C Security protocol is inspired from the Secure Shell (SSH) protocol, which avoids a single point of failure since it does not rely on a singular remote third party for the security process. In this protocol, both agencies must authenticate each other using public key authentication, before a secure migration process. After successful authentication, an encrypted mobile agent is transferred and its integrity is verified by the receiver agency. This article describes the Mobile-C secure migration process and presents a comparison study with the SSH protocol. The performance analysis of the secure migration process is performed by comparing the turnaround time of mobile agent with and without security options in a homogeneous environment. Copyright © 2010 John Wiley & Sons, Ltd.