[go: up one dir, main page]

Skip to main content

An Improved Execution Integrity Solution for Mobile Agents

  • Conference paper
Information Security and Privacy (ACISP 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3574))

Included in the following conference series:

  • 1323 Accesses

Abstract

In this paper we introduce a new infrastructural approach to providing mobile agent execution integrity, a very important property – especially to the confidence an agent user can place in the results of its deployed autonomous mobile agents. Existing mobile agent execution integrity schemes are shown to be comparatively inferior when analysed in light of a number of essential robustness properties. We provide an analysis of Hohl’s reference states scheme and introduce our novel execution integrity scheme, which builds – in part – on Hohl’s scheme. Besides significantly improving on this existing scheme, our scheme meets all of the desired criteria for a robust execution integrity scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Samaras, G.: Mobile Agents: What about Them? Did They Deliver what They Promised? Are They Here to Stay? In: International Conference on Mobile Data Management (MDM 2004), pp. 294–295 (2004)

    Google Scholar 

  2. Roth, V.: Obstacles to the adoption of mobile agents. In: International Conference on Mobile Data Management (MDM 2004), pp. 296–297 (2004)

    Google Scholar 

  3. Wilhelm, U.: A Technical Approach to Privacy based on Mobile Agents Protected by Tamper-resistant Hardware. PhD thesis, Ecole Polytechnique Federale de Lausanne, Switzerland (1999)

    Google Scholar 

  4. Yao, M.: A Security Architecture for Protecting Dynamic Components of Mobile Agents. PhD thesis, Information Security Research Centre, Faculty of Information Technology, Queensland University of Technology (2004)

    Google Scholar 

  5. Gray, R.: Agent Tcl: A flexible and secure mobile-agent system. PhD thesis, Dartmouth College, Hanover, New Hampshire (1997)

    Google Scholar 

  6. Karnik, N.: Security in Mobile Agent Systems. PhD dissertation, University of Minnesota (1998)

    Google Scholar 

  7. Weiss, G. (ed.): Multiagent Systems: A Modern Approach to Distributed Artificial Intelligence. MIT Press, Cambridge (2000)

    Google Scholar 

  8. Farmer, W.M., Guttman, J.D., Swarup, V.: Security for Mobile Agents: Issues and Requirements. In: Presented at the 1996 National Information Systems Security Conference, Baltimore, MD, USA (1996), http://csrc.nist.gov/nissc/1996/papers/NISSC96/paper033/SWARUP96.PDF

  9. Hohl, F.: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 92–113. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  10. Jansen, W.: Countermeasures for Mobile Agent Security. Computer Communications Special Issue on Advanced Security Techniques for Network Protection (2000)

    Google Scholar 

  11. Alfalayleh, M., Brankovic, L.: An Overview of Security Issues and Techniques in Mobile Agents. In: Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, pp. 59–78 (2004), Available at http://sec.isi.salford.ac.uk/cms2004/Program/index.html

  12. Claessens, J., Preneel, B., Vandewalle, J. (How) can mobile agents do secure electronic transactions on untrusted hosts? - A survey of the security issues and current solutions. ACM Transactions on Internet Technology (TOIT) 3, 28–48 (2003)

    Article  Google Scholar 

  13. Hohl, F.: A Protocol to Detect Malicious Hosts Attacks by Using Reference States. Technical report, Universit Stuttgart, Fakult Informatik (1999)

    Google Scholar 

  14. Hohl, F.: A framework to protect mobile agents by using reference states. In: International Conference on Distributed Computing Systems, pp. 410–417 (2000)

    Google Scholar 

  15. Giansiracusa, M., Russell, S., Clark, A., Roth, V.: Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 343–357. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  16. Giansiracusa, M., Russell, S., Clark, A., Hynd, J.: A Step Closer to a Secure Internet Mobile Agent Community. In: Fifth Asia-Pacific Industrial Engineering and Management Systems Conference, APIEMS 2004 (2004) published on CDRom ISBN: 0-9596291-8-1

    Google Scholar 

  17. Giansiracusa, M., Russell, S., Clark, A.: Clever Use of Trusted Third Parties for Mobile Agent Security. In: Applied Cryptography and Network Security - Technical Track, pp. 398–407. ICISA Press (2004)

    Google Scholar 

  18. Giansiracusa, M.: A Secure Infrastructural Strategy for Safe Autonomous Mobile Agents. PhD thesis Passed internal examination, submitted for external examination (2005), available at http://everest.fit.qut.edu.au/~n1402773/MicPhDThesis-11April2005.pdf

  19. Biehl, I., Meyer, B., Wetzel, S.: Ensuring the Integrity of Agent-Based Computations by Short Proofs. In: Rothermel, K., Hohl, F. (eds.) MA 1998. LNCS, vol. 1477, pp. 183–194. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  20. Tan, H.K., Moreau, L.: Extending Execution Tracing for Mobile Code Security. In: Fischer, K., Hutter, D. (eds.) Second International Workshop on Security of Mobile MultiAgent Systems (SEMAS 2002), pp. 51–59 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Giansiracusa, M., Russell, S., Clark, A., Hynd, J. (2005). An Improved Execution Integrity Solution for Mobile Agents. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_15

Download citation

  • DOI: https://doi.org/10.1007/11506157_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26547-4

  • Online ISBN: 978-3-540-31684-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics