Towards Fault-Tolerant and Secure Agentry
WDAG '97 Proceedings of the 11th International Workshop on Distributed Algorithms
Empowering Mobile Software Agents
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Analyzing Mobile Code Languages
MOS '96 Selected Presentations and Invited Papers Second International Workshop on Mobile Object Systems - Towards the Programmable Internet
A Framework to Protect Mobile Agents by Using Reference States
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
Mobile software agents: an overview
IEEE Communications Magazine
IEEE Communications Magazine
A security protocol for mobile agents based upon the cooperation of sedentary agents
Journal of Network and Computer Applications
Business transaction coordination in multi-agent financial web services
International Journal of Web and Grid Services
A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm
Proceedings of the 2008 ACM symposium on Applied computing
A secure protocol for mobile agents in hostile environment
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Hi-index | 0.00 |
This paper proposes an improved itinerary recording protocol for securing distributed architectures based on mobile agents. The behavior of each of the cooperating agents is described, as well as the decision process establishing the identities of offenders when an attack is detected. Our protocol is tested on a set of potential attacks and the results confirm our assumption regarding offender designations and moments of detection. More precisely, the performance evaluation shows that our protocol detects the attack where there is collaboration between a platform on the cooperating agents' itinerary and another on the mobile agent's itinerary. As a result, this protocol constitutes a suitable option for electronic commerce applications where security concerns prevail over cost factors.