Seven good reasons for mobile agents
Communications of the ACM
Mutual protection of co-operating agents
Secure Internet programming
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts
Mobile Agents and Security
Protecting Mobile Agents Against Malicious Hosts
Mobile Agents and Security
A buddy model of security for mobile agent communities operating in pervasive scenarios
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Countering Security Vulnerabilities in Agent Execution Using a Self Executing Security Examination
AAMAS '04 Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems - Volume 3
Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties
EEE '05 Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and e-Service
A security protocol for mobile agents based upon the cooperation of sedentary agents
Journal of Network and Computer Applications
Authentication Mechanisms for Mobile Agents
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Protection of a mobile agent with a reference clone
Computer Communications
Advanced mobile agent security models for code integrity and malicious availability check
Journal of Network and Computer Applications
Detection of Mobile Agent's Blocking in Secure Layered Architecture
CSNT '11 Proceedings of the 2011 International Conference on Communication Systems and Network Technologies
Formal Modeling and Analysis of a Secure Mobile-Agent System
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Hi-index | 0.00 |
The motivation for using mobile agent technology in the context of distributed application stems from its various advantages like intelligence, mobility, communication ability and fault tolerance capability. As every technological movement is aligned with its repercussions, the mobile agent technology also has its inherent security loop holes. Researchers have proposed various approaches to mitigate security bottlenecks but the threat of malicious execution environment in permissible and effectual conduct is still vague and unresolved. In this paper, we introduced a security protocol to protect mobile agent from different kinds of security attacks. The basic building blocks of our protocol are built on the foundation of integrity based confidentiality and self-protection approach based on agent driven security. The general idea behind self-protection is to make mobile agent less interactive during its execution. In order to achieve agent driven security, we bring forth a novel concept of symmetric key's component distribution, wherein a key component is distributed in secure manner and other key component is derived from ensuring integrity of data collected at run time. In order to verify the validity of our approach in overcoming different kind of security attacks, we present Petri net based formal representation of our protocol to strengthen the belief of distributed applications. In addition, we implement our approach on JADE (Java agent development framework) platform and compare it with well-known self-protection approach on the basis of computational complexity and services offered.