Affiliation:
1. Queen’s University, Canada
Abstract
Mobile agents are self-contained programs that migrate among computing devices to achieve tasks on behalf of users. Autonomous and mobile agents make it easier to develop complex distributed systems. Many applications can benefit greatly from employing mobile agents, especially e-commerce. For instance, mobile agents can travel from one e-shop to another, collecting offers based on customers’ preferences. Mobile agents have been used to develop systems for telecommunication networks, monitoring, information retrieval, and parallel computing. Characteristics of mobile agents, however, introduce new security issues which require carefully designed solutions. On the one hand, malicious agents may violate privacy, attack integrity, and monopolize hosts’ resources. On the other hand, malicious hosts may manipulate agents’ memory, return wrong results from system calls, and deny access to necessary resources. This has motivated research focused on devising techniques to address the security of mobile-agent systems. This chapter surveys the techniques securing mobile-agent systems. The survey categorizes the techniques based on the degree of collaboration used to achieve security. This categorization resembles the difference between this chapter and other surveys in the literature where categorization is on the basis of entities/ parts protected and underlying methodologies used for protection. This survey shows the importance of collaboration in enhancing security and discusses its implications and challenges.
Reference70 articles.
1. Amme, W., Dalton, N., Von Ronne, J., & Franz, M. (2001). SafeTSA: A type safe and referentially secure mobile-code representation based on static single assignment form. In Proceedings of the ACM Conference on Programming Language Design and Implementation (pp. 137-147). New York: ACM Press.
2. Bamasak, O., & Zhang, N. (2004). A secure method for signature delegation to mobile agents. In Proceedings of the ACM Symposium on Applied computing (pp. 813-818). New York: ACM Press.
3. Bellavista, P., Corradi, A., Federici, C., Montanari, R., & Tibaldi, D. (2004). Security for mobile agents: Issues and challenges. In I. Mahgoub & M. Ilyas (Eds.), Handbook of Mobile Computing (pp. 941-959). Boca Raton, FL: CRC Press.
4. Bellifemine, F., Caire, G., Poggi, A., & Rimassa, G. (2003). JADE: A white paper. Retrieved Jan 2008, from http://jade.tilab.com/papers/2003/WhitePaperJADEEXP.pdf
5. Berkovits, S., Guttman, J. D., & Swarup, V. (1998). Authentication for mobile agents. In G. Vigna (Ed.), Mobile Agents and Security (pp. 114-136). Berlin, Germany: Springer-Verlag.