Protecting agents from malicious hosts using TPM

نویسندگان

  • Antonio Muñoz
  • Antonio Maña
  • Daniel Serrano
چکیده

Software agents represent a promising computing paradigm. They are an elegant technology to solve problems that can not be easily solved in other way. The Scientific Community has proved that the use of the software agents approach simplifies the solution of difierent type of traditional computing problems. A proof of this is that several important applications exist based on this technology. It is clear that software agents have so many benefits, but unfortunately, a lack of the appropriate security mechanisms for systems based on them represents a barrier for the widespread use of this paradigm in the industry. The application of the current security mechanisms is not trivial for agent based system developers, since they usually are not security experts and consequently do not count on the appropriate expertise. This paper presents a new protection infrastructure solving the problem known as malicious host in mobile agent systems. This protection infrastructure implements a secure protocol to migrate agents from host to host relying in hardware elements, particularly it is based on the recent advances in Trusted Platforms Modules (TPM) computing. In order to provide an easy way of using the proposed infrastructure we provide it by means of an extension to the Java Agent Development framework (JADE). Finally, the migrating protocol presented has been validated using the Automated Validation of Internet Security Protocols and Applications (AVISPA) framework, this validation is presented in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting the Data State of Mobile Agents by Using Bitmaps and XOR Operators

The identified security areas comprise protecting hosts against malicious agents, protecting the agent’s transmission and protecting agents against malicious hosts. The first two security issues and the protection of the agent’s code state can be solved by applying traditional security techniques. Even though there are some works that manage the privacy of execution, their implementation is alm...

متن کامل

Preventing Attacks on Mobile Agents by Malicious Hosts

The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a m...

متن کامل

Path-Based Security for Mobile Agents

As mobile agents are increasingly adopted in intranets, on the Internet, and on computational grids, new security concerns become increasingly important. Unlike other kinds of mobile code, such as applets, which are pulled a single time to remote systems (single-hop), mobile agents may move using their own itinerary through a series of systems (multiple-hop), potentially carrying sensitive info...

متن کامل

A Security Based Model for Mobile Agent Software Systems

Security modeling for agents has been one of the most challenging issues in developing practical mobile agent software systems. In the past, researchers have developed mobile agent systems with emphasis either on protecting mobile agents from malicious hosts or protecting hosts from malicious agents. In this paper, we propose a security based mobile agent system architecture that provides a gen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJCSA

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2009