A New Approach for Mobile Agent Security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
A New Approach for Mobile Agent Security

Authors: R. Haghighat far, H. Yarahmadi

Abstract:

A mobile agent is a software which performs an action autonomously and independently as a person or an organizations assistance. Mobile agents are used for searching information, retrieval information, filtering, intruder recognition in networks, and so on. One of the important issues of mobile agent is their security. It must consider different security issues in effective and secured usage of mobile agent. One of those issues is the integrity-s protection of mobile agents. In this paper, the advantages and disadvantages of each method, after reviewing the existing methods, is examined. Regarding to this matter that each method has its own advantage or disadvantage, it seems that by combining these methods, one can reach to a better method for protecting the integrity of mobile agents. Therefore, this method is provided in this paper and then is evaluated in terms of existing method. Finally, this method is simulated and its results are the sign of improving the possibility of integrity-s protection of mobile agents.

Keywords: Integrity, Mobile Agent, Security.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1328418

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1708

References:


[1] Martin L. Griss , " Software Agents as Next Generation Software Components," Component-based Software Engineering: Putting the Pieces Together, pp.: 641-657.
[2] Borselius N., "Mobile agent security," Electronic & Communication Engineering Journal, Vol. 14, No. 5, 2002.
[3] Jansen W., "C ountermeasures for Mobile Agent Security," Componentbased Software Engineering.
[4] Bierman E., Cloete E., "Classification of Malicious Host Threats in Mobile Agent Computing," ACM International Conference, Vol. 30, pp.: 141-148, 2002.
[5] Roth V., "On the Robustness of Some Cryptographic Protocol for Mobile Agent Protection," The Second Int. Joint Conference on Autonomous Agents and Multiagent Systems, Melbourne, Australia, pp.: 851-858, 2003.
[6] Acquisti A., William J., Van Hoof R., Scott M., Sierhuis M., " Brahms Tutorial version 1.00," 2003.
[7] Grand M., "Java Language Reference," ISBN: 1-56592-326-x, 450 pages, 1997.