Self-reliant mobile code: a new direction of agent security

被引:8
|
作者
Srivastava, Shashank [1 ]
Nandi, G. C. [1 ]
机构
[1] Indian Inst Informat Technol, Allahabad, Uttar Pradesh, India
关键词
Mobile agent security; Self-protection; JADE; Formal proof; Integrity based confidentiality;
D O I
10.1016/j.jnca.2013.01.004
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The motivation for using mobile agent technology in the context of distributed application stems from its various advantages like intelligence, mobility, communication ability and fault tolerance capability. As every technological movement is aligned with its repercussions, the mobile agent technology also has its inherent security loop holes. Researchers have proposed various approaches to mitigate security bottlenecks but the threat of malicious execution environment in permissible and effectual conduct is still vague and unresolved. In this paper, we introduced a security protocol to protect mobile agent from different kinds of security attacks. The basic building blocks of our protocol are built on the foundation of integrity based confidentiality and self-protection approach based on agent driven security. The general idea behind self-protection is to make mobile agent less interactive during its execution. In order to achieve agent driven security, we bring forth a novel concept of symmetric key's component distribution, wherein a key component is distributed in secure manner and other key component is derived from ensuring integrity of data collected at run time. In order to verify the validity of our approach in overcoming different kind of security attacks, we present Petri net based formal representation of our protocol to strengthen the belief of distributed applications. In addition, we implement our approach on JADE (Java agent development framework) platform and compare it with well-known self-protection approach on the basis of computational complexity and services offered. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:62 / 75
页数:14
相关论文
共 50 条
  • [1] Mobile-Agent's Self-Reliant Host Security Examination
    Irwan
    Langi, Armein Z. R.
    Husni, Emir
    [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2015,
  • [2] SELF-RELIANT SOCIALISM
    FYFE, C
    [J]. NEW SOCIETY, 1969, 13 (352): : 1005 - 1006
  • [3] Development of Self-reliant Subchannel Analysis Code CORTH
    Liu, Yu
    Tan, Changlu
    Pan, Junjie
    Wang, Xiaoyu
    Xu, Liangjian
    Deng, Jian
    [J]. Hedongli Gongcheng/Nuclear Power Engineering, 2017, 38 (06): : 157 - 162
  • [4] A stronger Common Foreign and Security Policy for a self-reliant Union?
    不详
    [J]. COMMON MARKET LAW REVIEW, 2018, 55 (06): : 1675 - 1684
  • [5] The self-reliant homestead.
    Heidmann, I
    [J]. LIBRARY JOURNAL, 2003, 128 (15) : 82 - 82
  • [6] INDIANAS SELF-RELIANT UPLANDERS
    THOM, JA
    [J]. NATIONAL GEOGRAPHIC, 1976, 149 (03) : 341 - 362
  • [7] THE POLITICS OF SELF-RELIANT DEVELOPMENT
    MANDLE, JR
    [J]. MONTHLY REVIEW-AN INDEPENDENT SOCIALIST MAGAZINE, 1981, 32 (11) : 17 - 22
  • [8] New Progress on Self-Reliant Innovation of HVDC Technology
    Li Yan
    [J]. Electricity, 2009, 20 (04) : 20 - 24
  • [9] MEDIA, CULTURE AND SELF-RELIANT DEVELOPMENT
    CHENCHABI, R
    [J]. DEVELOPMENT-SEEDS OF CHANGE-VILLAGE THROUGH GLOBAL ORDER, 1981, (3-4): : 65 - +
  • [10] Self-reliant India: self of a nation or a national self?
    Sarukkai, Sundar
    [J]. JOURNAL OF SOCIAL AND ECONOMIC DEVELOPMENT, 2021, 23 (SUPPL 2) : 357 - 365