Skip to main content
Top

2015 | OriginalPaper | Chapter

Security of Mobile Agent Platforms Using Access Control and Cryptography

Authors : Hind Idrissi, El Mamoun Souidi, Arnaud Revel

Published in: Agent and Multi-Agent Systems: Technologies and Applications

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile Agents are autonomous software entities able to move from one host to another. However, this mobility is not all the time safe, as a hosting platform may receive agents with malicious behaviors. In this paper, we attempt to deal with this security problem by proposing a solution based on a strengthened cryptographic authentication and an access control policy. The proposed authentication process is performed through a resistant MITM Diffie-Hellman key exchange protocol, while the resources access control policy is elaborated basing an enhanced DAC model where Shamir-Threshold Scheme is used to manage and share access rights. We have conducted detailed experiments and practical investigations to evaluate the security of our approach and its effectiveness to resist face to some well known attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Giovanni Caire, F.C.: JADE tutorial: jade programming for beginners. TILAB (2007) Giovanni Caire, F.C.: JADE tutorial: jade programming for beginners. TILAB (2007)
2.
go back to reference Foundation for Intelligent Physical Agents, Geneva, Switzerland, FIPA ACL Message Structure Specification (2003) Foundation for Intelligent Physical Agents, Geneva, Switzerland, FIPA ACL Message Structure Specification (2003)
3.
go back to reference Jansen, W., Karygiannis, T.: Mobile Agent Security, pp. 800–819. NIST Special Publication (1999) Jansen, W., Karygiannis, T.: Mobile Agent Security, pp. 800–819. NIST Special Publication (1999)
4.
go back to reference Jung, Y., Kim, M., Masoumzadeh, A., Joshi, J.B.: A survey of security issue in multi-agent systems. Artificial Intelligence Review 37(3), 239–260 (2012) Jung, Y., Kim, M., Masoumzadeh, A., Joshi, J.B.: A survey of security issue in multi-agent systems. Artificial Intelligence Review 37(3), 239–260 (2012)
5.
go back to reference Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211–218 (2002) Borselius, N.: Mobile agent security. Electron. Commun. Eng. J. 14(5), 211–218 (2002)
6.
go back to reference Pirzadeh, H., Dub, D., Hamou-Lhadj, A.: An extended proof-carrying code framework for security enforcement. In: Transactions on Computational Science XI, pp. 249–269. Springer, Berlin (2010) Pirzadeh, H., Dub, D., Hamou-Lhadj, A.: An extended proof-carrying code framework for security enforcement. In: Transactions on Computational Science XI, pp. 249–269. Springer, Berlin (2010)
7.
go back to reference Cao, C., Lu, J.: Path-history-based Access Control for Mobile Agents. International Journal of Parallel, Emergent and Distributed Systems 21(3), 215–225 (2006)CrossRefMATHMathSciNet Cao, C., Lu, J.: Path-history-based Access Control for Mobile Agents. International Journal of Parallel, Emergent and Distributed Systems 21(3), 215–225 (2006)CrossRefMATHMathSciNet
8.
go back to reference Tsiligiridis, T.A.: Security for mobile agents: privileges and state appraisal mechanism. Neural Parallel Sci. Comput. 12(2), 153–162 (2004)MATH Tsiligiridis, T.A.: Security for mobile agents: privileges and state appraisal mechanism. Neural Parallel Sci. Comput. 12(2), 153–162 (2004)MATH
9.
go back to reference Tuohimaa, S., Laine, M., Leppnen, V.: Dynamic rights in model-carrying code. In: Proceedings of the International Conference on Computer Systems and Technologies, pp. 1–7 (2006) Tuohimaa, S., Laine, M., Leppnen, V.: Dynamic rights in model-carrying code. In: Proceedings of the International Conference on Computer Systems and Technologies, pp. 1–7 (2006)
10.
go back to reference Arun, V., Shunmuganathan, K.L.: Secure sand-box for mobile computing host with shielded mobile agent. Indian J. Appl. Res. 3(9), 296–297 (2013)CrossRef Arun, V., Shunmuganathan, K.L.: Secure sand-box for mobile computing host with shielded mobile agent. Indian J. Appl. Res. 3(9), 296–297 (2013)CrossRef
11.
go back to reference Aumasson, J.: On the pseudo-random generator ISAAC. IACR Cryptology ePrint Archive, 2006:438 Aumasson, J.: On the pseudo-random generator ISAAC. IACR Cryptology ePrint Archive, 2006:438
12.
go back to reference Jaffar, A., Martinez, C.J.: Detail power analysis of the SHA-3 hashing algorithm candidates on xilinx spartan-3E. Int. J. Comput. Electr. Eng. 5(4), 410–413 (2013)CrossRef Jaffar, A., Martinez, C.J.: Detail power analysis of the SHA-3 hashing algorithm candidates on xilinx spartan-3E. Int. J. Comput. Electr. Eng. 5(4), 410–413 (2013)CrossRef
13.
go back to reference Phan, R.W.: Fixing the integrated Diffie-Hellman-DSA key exchange protocol. IEEE Commun. Lett. 9(6), 570–572 (2005)CrossRefMathSciNet Phan, R.W.: Fixing the integrated Diffie-Hellman-DSA key exchange protocol. IEEE Commun. Lett. 9(6), 570–572 (2005)CrossRefMathSciNet
14.
go back to reference Ennahbaoui, M., Elhajji, S.: Swot analysis of access control models. Int. J. Secur. Appl. 8(3), 407–424 (2014) Ennahbaoui, M., Elhajji, S.: Swot analysis of access control models. Int. J. Secur. Appl. 8(3), 407–424 (2014)
15.
go back to reference Blakley, G.R., Kabatiansky, G.: Shamirs threshold scheme. In: Encyclopedia of Cryptography and Security, pp. 1193–1194. Springer, US (2011) Blakley, G.R., Kabatiansky, G.: Shamirs threshold scheme. In: Encyclopedia of Cryptography and Security, pp. 1193–1194. Springer, US (2011)
16.
go back to reference Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, NIST (2001) Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, NIST (2001)
17.
go back to reference Ismail, L.: A secure mobile agents platform. J. Commun. 3(2), 1–12 (2008)CrossRef Ismail, L.: A secure mobile agents platform. J. Commun. 3(2), 1–12 (2008)CrossRef
Metadata
Title
Security of Mobile Agent Platforms Using Access Control and Cryptography
Authors
Hind Idrissi
El Mamoun Souidi
Arnaud Revel
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-19728-9_3

Premium Partner