Towards secure mobile agents

被引:0
|
作者
Aouadi, H [1 ]
Ben Ahmed, M [1 ]
机构
[1] Univ Manouba, RIADI, ENSI, Manouba, Tunisia
关键词
mobile agents; cryptography; Secure Virtual Machine; signed stamps; smart cards;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deployment of mobile agents in large scale on the Internet can not succeed without securing agents them selves. In fact, the transfers of agents over the Internet is not secured also hosts visited by mobile agents can be malicious and try to analyse or modify the agent code, data or behaviour. In our researches, we are interesting to secure agents on visited hosts. So, in this paper we will present the state of the art of securing mobile agents against malicious hosts and the approach that we suggest. In such state of the art, we identify strong and high cost approaches based on the use of additional hardware and weak and low cost approaches based on software solutions. In our approach, we replace the additional hardware by a software solution that we call SVM (Secure Virtual Machine). Thus, an agent is ciphered, signed (in part) and time stamped. On visited host, the agent will be executed by the secure virtual machine SVM without decrypting it. The cipher algorithm that we use is based on the segmentation of the agent, obfuscation of the segments, a symmetric encryption of every segment and the mess-up of segment execution sequence. To provide strong security, we will use smart cards to protect SVM itself.
引用
收藏
页码:261 / 265
页数:5
相关论文
共 50 条
  • [1] The MP architecture: Towards a secure framework for mobile agents
    Ecole Nationale Supérieure d'Informatique, ESI, BP 68M Oued Smar, 16309, Algiers, Algeria
    不详
    不详
    [J]. Int. J. Agent-Oriented Softw. Eng., 4 (390-414):
  • [2] A secure mobile agents platform
    Ismail, Leila
    [J]. Journal of Communications, 2008, 3 (02): : 1 - 21
  • [3] Secure Mobile Agents with Designated Hosts
    Zhang, Qi
    Mu, Yi
    Zhang, Minjie
    Deng, Robert H.
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 286 - +
  • [4] A secure migration process for mobile agents
    Malik, Najmus Saqib
    Ko, David
    Cheng, Harry H.
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2011, 41 (01): : 87 - 101
  • [5] Secure mobile agents with controlled resources
    Zhang, Qi
    Mu, Yi
    Zhang, Minjie
    Deng, Robert H.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1348 - 1366
  • [6] A secure communication framework for mobile agents
    Ugurlu, S
    Erdogan, N
    [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2005, PROCEEDINGS, 2005, 3733 : 412 - 421
  • [7] Using secure mobile agents as information brokers
    Bhoopalam, KP
    Mukkamala, R
    [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS: I, 2003, : 28 - 33
  • [8] Secure Autonomous Mobile Agents for Web Services
    Salah, Tasneem
    Hasan, Haya
    Zemerly, M. Jamal
    Yeun, Chan Yeob
    Al-Qutayri, Mahmoud
    Al-Hammadi, Yousof
    Hu, Jiankun
    [J]. 2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [9] MagicNET: Secure Communication Methodology for Mobile Agents
    Shibli, Muhammad Awais
    Yousaf, Imran
    Dar, Kashif
    Muftic, Sead
    [J]. 12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1567 - 1573
  • [10] Secure Electronic Payments Based on Mobile Agents
    Artur Romão
    Miguel Mira Da Silva
    Alberto Silva
    [J]. Distributed and Parallel Databases, 2000, 8 : 447 - 470