Abstract
In this paper we introduce a new infrastructural approach to providing mobile agent execution integrity, a very important property – especially to the confidence an agent user can place in the results of its deployed autonomous mobile agents. Existing mobile agent execution integrity schemes are shown to be comparatively inferior when analysed in light of a number of essential robustness properties. We provide an analysis of Hohl’s reference states scheme and introduce our novel execution integrity scheme, which builds – in part – on Hohl’s scheme. Besides significantly improving on this existing scheme, our scheme meets all of the desired criteria for a robust execution integrity scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Samaras, G.: Mobile Agents: What about Them? Did They Deliver what They Promised? Are They Here to Stay? In: International Conference on Mobile Data Management (MDM 2004), pp. 294–295 (2004)
Roth, V.: Obstacles to the adoption of mobile agents. In: International Conference on Mobile Data Management (MDM 2004), pp. 296–297 (2004)
Wilhelm, U.: A Technical Approach to Privacy based on Mobile Agents Protected by Tamper-resistant Hardware. PhD thesis, Ecole Polytechnique Federale de Lausanne, Switzerland (1999)
Yao, M.: A Security Architecture for Protecting Dynamic Components of Mobile Agents. PhD thesis, Information Security Research Centre, Faculty of Information Technology, Queensland University of Technology (2004)
Gray, R.: Agent Tcl: A flexible and secure mobile-agent system. PhD thesis, Dartmouth College, Hanover, New Hampshire (1997)
Karnik, N.: Security in Mobile Agent Systems. PhD dissertation, University of Minnesota (1998)
Weiss, G. (ed.): Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, Cambridge (2000)
Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Issues and Requirements. In: Presented at the 1996 National Information Systems Security Conference, Baltimore, MD, USA (1996), http://csrc.nist.gov/nissc/1996/papers/NISSC96/paper033/SWARUP96.PDF
Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)
Jansen, W.: Countermeasures for Mobile Agent Security. Computer Communications Special Issue on Advanced Security Techniques for Network Protection (2000)
Alfalayleh, M., Brankovic, L.: An Overview of Security Issues and Techniques in Mobile Agents. In: Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, pp. 59–78 (2004), Available at http://sec.isi.salford.ac.uk/cms2004/Program/index.html
Claessens, J., Preneel, B., Vandewalle, J. (How) can mobile agents do secure electronic transactions on untrusted hosts? - A survey of the security issues and current solutions. ACM Transactions on Internet Technology (TOIT) 3, 28–48 (2003)
Hohl, F.: A Protocol to Detect Malicious Hosts Attacks by Using Reference States. Technical report, Universit Stuttgart, Fakult Informatik (1999)
Hohl, F.: A framework to protect mobile agents by using reference states. In: International Conference on Distributed Computing Systems, pp. 410–417 (2000)
Giansiracusa, M., Russell, S., Clark, A., Roth, V.: Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 343–357. Springer, Heidelberg (2004)
Giansiracusa, M., Russell, S., Clark, A., Hynd, J.: A Step Closer to a Secure Internet Mobile Agent Community. In: Fifth Asia-Pacific Industrial Engineering and Management Systems Conference, APIEMS 2004 (2004) published on CDRom ISBN: 0-9596291-8-1
Giansiracusa, M., Russell, S., Clark, A.: Clever Use of Trusted Third Parties for Mobile Agent Security. In: Applied Cryptography and Network Security - Technical Track, pp. 398–407. ICISA Press (2004)
Giansiracusa, M.: A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents. PhD thesis Passed internal examination, submitted for external examination (2005), available at http://everest.fit.qut.edu.au/~n1402773/MicPhDThesis-11April2005.pdf
Biehl, I., Meyer, B., Wetzel, S.: Ensuring the Integrity of Agent-Based Computations by Short Proofs. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 183–194. Springer, Heidelberg (1998)
Tan, H.K., Moreau, L.: Extending Execution Tracing for Mobile Code Security. In: Fischer, K., Hutter, D. (eds.) Second International Workshop on Security of Mobile MultiAgent Systems (SEMAS 2002), pp. 51–59 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Giansiracusa, M., Russell, S., Clark, A., Hynd, J. (2005). An Improved Execution Integrity Solution for Mobile Agents. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_15
Download citation
DOI: https://doi.org/10.1007/11506157_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26547-4
Online ISBN: 978-3-540-31684-8
eBook Packages: Computer ScienceComputer Science (R0)