Abstract
Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed to assess agent platform security. These tests focus on malicious agents trying to attack other agents or the agency. Currently, they have been carried out for two agent platforms: JADE and SeMoA. These tests show which of the known theoretical security problems are relevant in practice. Furthermore, they reveal how these problems were addressed by the respective platform and what security flaws are present.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Braun, P., Rossak, W.: Mobile Agents. Basic Concepts, Mobility Models & the Tracy Toolkit. dpunkt.verlag (2005)
Karmouch, A., Magedanz, T., Delgado, J. (eds.) MATA 2002. LNCS, vol. 2521. Springer, Heidelberg (2002)
Yang, K., Galis, A., Guo, X., Liu, D.: Rule-Driven Mobile Intelligent Agents for Real-Time Configuration of IP Networks. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol. 2773, pp. 921–928. Springer, Heidelberg (2003)
Fok, C., Roman, G., Lu, C.: Mobile Agent Middleware for Sensor Networks: An Application Case Study. In: Proc. of Fourth Int. Symposium on Information Processing in Sensor Networks, IEEE CNF 2005, pp. 382–387 (2005)
Brewington, B., Gray, R., Moizumi, K., Kotz, D., Cybenko, G., Rus, D.: Mobile agents in distributed information retrieval. In: Intelligent Information Agents. Springer, Heidelberg (1999)
Thati, P., Chang, P., Agha, G.: Crawlets: Agents for high performance web search engine. In: Picco, G.P. (ed.) MA 2001. LNCS, vol. 2240, pp. 119–134. Springer, Heidelberg (2001)
Geirland, J.: The Feature: Mobile Intelligent Agents (2002), http://www.thefeature.com/article?articleid=26051
Gray, R., Kotz, D., Cybenko, G., Rus, D.: D’Agents: Security in a Multiple-Language, Mobile-Agent System. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)
Jansen, W., Karygiannis, T.: Mobile Agent Security. Special Publication. NIST, pp. 800–819 (1999)
Roth, V.: Programming Satan’s Agents. In: Fischer, K., Hutter, D. (eds.) Proc. of the 1st Int. Workshop on Secure Mobile Multi-Agent Systems, SEMAS 2001. Elsevier, Amsterdam (2002)
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)
Jansen, W.: A Privilege Management Scheme for Mobile Agent Systems. In: SEMAS 2001, First International Workshop on Security of Mobile Multiagent Systems. Electronic Notes in Theoretical Computer Science, vol. 63 (2002)
Tschudin, C.: Mobile Agent Security. In: Klusch, M. (ed.) Intelligent information agents: agent based information discovery and management in the Internet, ch. 18. Springer, Heidelberg (1999)
Vigna, G.: Protecting Mobile Agents Through Tracing. In: Proc. of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvalskyla, Finland (1997)
Bellifemine, F., Caire, G., Poggi, A., Rimassa, G.: JADE - A White Paper (2003), http://jade.tilab.com
SeMoA (2006), http://www.semoa.org
Santana Torrellas, G.: A Network Security Architectural Approach for Systems Integrity using Multi Agent Systems Engineering. In: Int. Symposium on Parallel Architectures, Algorithms and Networks (ISPAN) (2004)
Borselius, N.: Mobile Agent Security. Electronics & Communication Engineering Journal (2002)
JADE Board: JADE Security Guide (2005), http://jade.tilab.com
Cortese, E., Caire, G., Bochicchio, R.: JADE Test Suite User Guide (2004), http://jade.tilab.com
Roth, V., Jalali, M., Pinsdorf, U.: Secure Mobile Agents (SeMoA) (2006), http://www.inigraphics.net/press/brochures/sec_broch/sec/Security.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bürkle, A., Hertel, A., Müller, W., Wieser, M. (2006). Evaluating Mobile Agent Platform Security. In: Fischer, K., Timm, I.J., André, E., Zhong, N. (eds) Multiagent System Technologies. MATES 2006. Lecture Notes in Computer Science(), vol 4196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11872283_14
Download citation
DOI: https://doi.org/10.1007/11872283_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-45376-5
Online ISBN: 978-3-540-46057-2
eBook Packages: Computer ScienceComputer Science (R0)