A New Approach for Mobile Agent Security

A mobile agent is a software which performs an action autonomously and independently as a person or an organizations assistance. Mobile agents are used for searching information, retrieval information, filtering, intruder recognition in networks, and so on. One of the important issues of mobile agent is their security. It must consider different security issues in effective and secured usage of mobile agent. One of those issues is the integrity-s protection of mobile agents. In this paper, the advantages and disadvantages of each method, after reviewing the existing methods, is examined. Regarding to this matter that each method has its own advantage or disadvantage, it seems that by combining these methods, one can reach to a better method for protecting the integrity of mobile agents. Therefore, this method is provided in this paper and then is evaluated in terms of existing method. Finally, this method is simulated and its results are the sign of improving the possibility of integrity-s protection of mobile agents.




References:
[1] Martin L. Griss , " Software Agents as Next Generation Software
Components," Component-based Software Engineering: Putting the
Pieces Together, pp.: 641-657.
[2] Borselius N., "Mobile agent security," Electronic & Communication
Engineering Journal, Vol. 14, No. 5, 2002.
[3] Jansen W., "C ountermeasures for Mobile Agent Security," Componentbased
Software Engineering.
[4] Bierman E., Cloete E., "Classification of Malicious Host Threats in
Mobile Agent Computing," ACM International Conference, Vol. 30, pp.:
141-148, 2002.
[5] Roth V., "On the Robustness of Some Cryptographic Protocol for
Mobile Agent Protection," The Second Int. Joint Conference on
Autonomous Agents and Multiagent Systems, Melbourne, Australia, pp.:
851-858, 2003.
[6] Acquisti A., William J., Van Hoof R., Scott M., Sierhuis M., " Brahms
Tutorial version 1.00," 2003.
[7] Grand M., "Java Language Reference," ISBN: 1-56592-326-x, 450
pages, 1997.