Skip to main content

2017 | OriginalPaper | Buchkapitel

Security and Trust on Mobile Agent Platforms: A Survey

verfasst von : Donies Samet, Farah Barika Ktata, Khaled Ghedira

Erschienen in: Agent and Multi-Agent Systems: Technology and Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile agent technologies are known for their capacity to develop and construct distributed, heterogeneous and interoperable systems. Despite the presence of several platforms for the development of mobile agent applications, security issues act as a main deterrent against such trends. Based on this, we conducted a comparative study of the most promising and existing mobile agent platforms, showing the diverse security features employed to address various threats. We investigate also the trust models used by the platforms. The established study focuses on the contributions to verify security criteria by the used security mechanisms in every studied platform. This study is important not only to allow practitioners pick the most suitable platforms to meet their security requirements, but also to allow researchers address the voids by ameliorating the concluded limits and proposing possible improvements of new versions of these platforms.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aggarwal, S., Bhardwaj, S., Kumar, P.: Security approaches for mobile multi-agent system. Int. J. Emerg. Technol. Adv. Eng. 2(12), 681–687 (2012) Aggarwal, S., Bhardwaj, S., Kumar, P.: Security approaches for mobile multi-agent system. Int. J. Emerg. Technol. Adv. Eng. 2(12), 681–687 (2012)
2.
Zurück zum Zitat Kravari, K., Bassiliades, N.: A survey of agent platforms. J. Artif. Soc. Soc. Simul. 18, 11 (2015) Kravari, K., Bassiliades, N.: A survey of agent platforms. J. Artif. Soc. Soc. Simul. 18, 11 (2015)
3.
Zurück zum Zitat Jansen, W., Karygiannis, T.: Mobile agent security, National Institute of Standards and Technology (2000) Jansen, W., Karygiannis, T.: Mobile agent security, National Institute of Standards and Technology (2000)
4.
Zurück zum Zitat Braubach, L., Jander, K., Pokahr, A.: A practical security infrastructure for open multi-agent systems. In: 11th German Conference, MATES 2013, Koblenz (2013) Braubach, L., Jander, K., Pokahr, A.: A practical security infrastructure for open multi-agent systems. In: 11th German Conference, MATES 2013, Koblenz (2013)
5.
Zurück zum Zitat Lange, D.B., Mitsuru, O.: Programming and Deploying Java Mobile Agents Aglets. Addison-Wesley Longman Publishing, Amsterdam (1998) Lange, D.B., Mitsuru, O.: Programming and Deploying Java Mobile Agents Aglets. Addison-Wesley Longman Publishing, Amsterdam (1998)
6.
Zurück zum Zitat Bellavista, P., Corradi, A., Stefanelli, C.: A secure and open mobile agent programming environment. In: Fourth International Symposium on Autonomous Decentralized Systems (1999) Bellavista, P., Corradi, A., Stefanelli, C.: A secure and open mobile agent programming environment. In: Fourth International Symposium on Autonomous Decentralized Systems (1999)
7.
Zurück zum Zitat Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents integrity in e-commerce applications. In: 19th IEEE International Conference on Distributed Computing Systems (1999) Corradi, A., Montanari, R., Stefanelli, C.: Mobile agents integrity in e-commerce applications. In: 19th IEEE International Conference on Distributed Computing Systems (1999)
9.
Zurück zum Zitat Bellifemine, F., Cairea, G., Poggib, A., Rimassac, G.: JADE: a software framework for developing multi-agent applications. Lessons learned. J. Inf. Softw Technol. 50, 10–21 (2008)CrossRef Bellifemine, F., Cairea, G., Poggib, A., Rimassac, G.: JADE: a software framework for developing multi-agent applications. Lessons learned. J. Inf. Softw Technol. 50, 10–21 (2008)CrossRef
10.
Zurück zum Zitat Helsinger, A., Thome, M., Wright, T.: Cougaar: a scalable, distributed multi-agent architecture. In: IEEE International Conference on Systems, Man and Cybernetics (2004) Helsinger, A., Thome, M., Wright, T.: Cougaar: a scalable, distributed multi-agent architecture. In: IEEE International Conference on Systems, Man and Cybernetics (2004)
11.
Zurück zum Zitat Feiertag, R., Rho J., Rosset S.: Using security mechanisms in Cougaar, 1st Open Cougaar Conference (2004) Feiertag, R., Rho J., Rosset S.: Using security mechanisms in Cougaar, 1st Open Cougaar Conference (2004)
12.
Zurück zum Zitat Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET-secure agent communication model. In: 11th International Conference on Computer and Information Technology, ICCIT (2008) Nusrat, E., Ahmed, A.S., Rahman, G.M., Jamal, L.: SAGLET-secure agent communication model. In: 11th International Conference on Computer and Information Technology, ICCIT (2008)
13.
Zurück zum Zitat Poggi, A., Rimassa, G., Tomaiuol, M.: Multi-user and security support for multi-agent systems. In: WOA (2001) Poggi, A., Rimassa, G., Tomaiuol, M.: Multi-user and security support for multi-agent systems. In: WOA (2001)
14.
Zurück zum Zitat Conti, V., Vitabile, S., Pilato, G., Sorbello, F.: An enhanced authentication system for the JADE-S platform. WSEAS Trans. Inf. Sci. Appl. 1, 178–183 (2004) Conti, V., Vitabile, S., Pilato, G., Sorbello, F.: An enhanced authentication system for the JADE-S platform. WSEAS Trans. Inf. Sci. Appl. 1, 178–183 (2004)
15.
Zurück zum Zitat Vitabile, S., Pilato, G., Conti, V., Gioè, G., Sorbello, F.: Biometric features for mobile agents ownership. IPSI BgD Trans. Internet Res. 1, 81–89 (2004) Vitabile, S., Pilato, G., Conti, V., Gioè, G., Sorbello, F.: Biometric features for mobile agents ownership. IPSI BgD Trans. Internet Res. 1, 81–89 (2004)
16.
Zurück zum Zitat Vitabile, S., Conti, V., Militello, C., Sorbello, F.: An extended JADE-S based framework for developing secure multi-agent systems. Comput. Stan. Interfaces 31, 913–930 (2009)CrossRef Vitabile, S., Conti, V., Militello, C., Sorbello, F.: An extended JADE-S based framework for developing secure multi-agent systems. Comput. Stan. Interfaces 31, 913–930 (2009)CrossRef
18.
Zurück zum Zitat Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E.: SAS: a secure aglet server. In: Computer Security Conference (2007) Jean, E., Jiao, Y., Hurson, A.R., Potok, T.E.: SAS: a secure aglet server. In: Computer Security Conference (2007)
19.
Zurück zum Zitat Cabri, G., Leonardi, L., Zambonelli, F.: Auction-based agent negotiation via programmable tuple spaces. In: 4th International Workshop, CIA, Boston, MA, USA (2000) Cabri, G., Leonardi, L., Zambonelli, F.: Auction-based agent negotiation via programmable tuple spaces. In: 4th International Workshop, CIA, Boston, MA, USA (2000)
21.
Zurück zum Zitat Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29, 38–47 (1996)CrossRef Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29, 38–47 (1996)CrossRef
22.
Zurück zum Zitat Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 9, 40–48 (1994)CrossRef Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 9, 40–48 (1994)CrossRef
23.
Zurück zum Zitat Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web (2003) Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web (2003)
25.
Zurück zum Zitat Singh, A., Ahuja, P.: Robust algorithm for securing an agent hosting platform. Int. J. Adv. Technol. 3, 84–91 (2012) Singh, A., Ahuja, P.: Robust algorithm for securing an agent hosting platform. Int. J. Adv. Technol. 3, 84–91 (2012)
26.
Zurück zum Zitat Ahuja, P., Sharma, V.: A JADE implemented mobile agent based host platform security. Comput. Eng. Intell. Syst. 3, 8–19 (2012) Ahuja, P., Sharma, V.: A JADE implemented mobile agent based host platform security. Comput. Eng. Intell. Syst. 3, 8–19 (2012)
Metadaten
Titel
Security and Trust on Mobile Agent Platforms: A Survey
verfasst von
Donies Samet
Farah Barika Ktata
Khaled Ghedira
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-59394-4_5