A Security Architecture for Protecting Dynamic Components of Mobile Agents
نویسنده
چکیده
New techniques, languages and paradigms have facilitated the creation of distributed applications in several areas. Perhaps the most promising paradigm is the one that incorporates the mobile agent concept. A mobile agent in a largescale network can be viewed as a software program that travels through a heterogeneous network, crossing various security domains and executing autonomously in its destination. Mobile agent technology extends the traditional network communication model by including mobile processes, which can autonomously migrate to new remote servers. This basic idea results in numerous benefits including flexible, dynamic customisation of the behavior of clients and servers and robust interaction over unreliable networks. In spite of its advantages, widespread adoption of the mobile agent paradigm is being delayed due to various security concerns. Currently available mechanisms for reducing the security risks of this technology do not efficiently cover all the existing threats. Due to the characteristics of the mobile agent paradigm and the threats to which it is exposed, security mechanisms must be designed to protect both agent hosting servers and agents. Protection to agent-hosting servers’ security is a reasonably well researched issue, and many viable mechanisms have been developed to address it. Protecting agents is technically more challenging and solutions to do so are far less developed. The primary added complication is that, as an agent traverses multiple servers that are trusted to different degrees, the agent’s owner has no control over the behaviors of the agent-hosting servers. Consequently the hosting servers can subvert the computation of the passing agent. Since it is infeasible to enforce the remote servers to enact the security policy that may prevent the server from corrupting agent’s data, cryptographic mechanisms defined by the agent’s owner may be one of the feasible solutions to protect agent’s data.
منابع مشابه
Cryptography Based Hybrid Security Architecture for Mobile Multi Agents
Distributed Computing is the current area of research. Many researchers are working in area of Distributed Computing and trying to find a solution for the security and other issues. In Distributed Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-...
متن کاملCost Evaluation of a Pki-based Security Framework for Mobile Agents
This paper presents a new framework for protecting itinerant mobile agents traveling to potentially hostile execution platforms. The proposed framework extends on an existing mobile code protection technique known as execution tracing. The objective is to create an implementation prototype of a secure mobile agent system that can be easily integrated into existing distributed security architect...
متن کاملA Security Based Model for Mobile Agent Software Systems
Security modeling for agents has been one of the most challenging issues in developing practical mobile agent software systems. In the past, researchers have developed mobile agent systems with emphasis either on protecting mobile agents from malicious hosts or protecting hosts from malicious agents. In this paper, we propose a security based mobile agent system architecture that provides a gen...
متن کاملIntrusion Detection System For Adhoc Networks
The rapid proliferation of wireless networks and mobile computing applications has changed thelandscape of network security. The recent denial of service attacks on major Internet sites have shown us, no open computer network is immunefrom intrusions. The wireless ad-hoc network is particularly vulnerable due to its featuresof open medium, dynamic changing topology, cooperative algorithms, lack...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کامل