Protecting General Flexible Itineraries of Mobile Agents
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Methods for Protecting a Mobile Agent's Route
ISW '99 Proceedings of the Second International Workshop on Information Security
Hi-index | 0.00 |
Mobile agent system raises significant security concerns and requires a thorough security framework, with a wide range of strategies and mechanisms, for the protection of both agents and agent hosts, against possibly malicious behavior. Researchers have identi?ed several security attacks. In general, the behavior of mobile agents is often prescribed by the set of tasks represented in an itinerary. The design and implementation of an itinerary can be a complex, time intensive task. A mobile agent running on a host may attacks, if the host is malicious. The attacks may be on the agent's static data, its collected information (dynamic data) and its itinerary. Hence itineraries must be made secure, in order to get secure agent behavior. In this paper, we propose the development of protocols, which provide security and robustness to different kinds of agent itineraries and present a comparison of the performance of these protocols with some existing ones.