Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/976440.976443dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
Article
Free access

A buddy model of security for mobile agent communities operating in pervasive scenarios

Published: 01 January 2004 Publication History
  • Get Citation Alerts
  • Abstract

    This paper examines the security aspects of different pervasive scenarios involving agent communities evolved using multi agent systems (MAS). It describes the motivation and the objectives behind the development of these agent communities and analyses the security vulnerabilities, which arise within them. To counter these vulnerabilities, the paper proposes a Buddy model of security for the agent community. In this model, every agent protects its neighbour within the community, thereby sharing the responsibilities of the security function. This feature makes it a better option as compared to other hierarchical models of security, which can be brought down by a concerted attack at the controller agent. This paper also demonstrates the applicability and the effectiveness of the Buddy model in different pervasive scenarios and makes a strong case for its adoption.

    References

    [1]
    'Agent Builder Toolkit', URL http://www.agentbuilder.com/Documentation/brochures/ABProBrochure.pdf, Date of Access 10/07/2003
    [2]
    'General Magic, Odyssey'. URL: http://www.genmagic.com/technology/odyssey.html, Date of Access 03/05/2003
    [3]
    'Grasshopper Release 2.2'. 2001, Basics and Concepts Revision1.0, URLhttp://www.grasshopper.de/download/doc/BasicsAndConcepts2.2.pdf, pages 70, Date of Access 03/12/2002
    [4]
    'Orbitz: Airline Tickets, Hotels, Car Rentals, Travel Deals', URL http://www.orbitz.com/, Date of Access 02/09/2003
    [5]
    Cohen, P. R., Cheyer, A. J., Wang, M, & Baeg, S. C. 1994, 'An Open Agent Architecture', In Proceedings of AAAI Spring Symposium, pp. 1--8.
    [6]
    Farmer, W. M., Guttman, J. D. & Swarup, V. 1996, 'Security for Mobile Agents: Authentication and State Appraisal', In Proceedings of the European Symposium on Research in Computer Security (ESORICS), pp 118--130.
    [7]
    Franklin, S. & Graesser, A. 1996. 'Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents', In Proceedings of the Third International Workshop on Agent Theories, Architectures, and Languages, Springer-Verlag.
    [8]
    Gosling, J. & McGilton, H.1996, 'The Java Language Environment: A White Paper', Sun Microsystems.
    [9]
    Jansen, W. 2000, 'Countermeasures for Mobile Agent Security' Computer Communications, Special Issue on Advances in Research and Application of Network Security, Elsevier Science BV.
    [10]
    Kirkland, A., Lee, J., Stephens, D. & White, M. 'CATCH-22 by Joseph Heller: An analysis and interpretation', URL http://www.beaconlc.org/ctech/stuwork/CATCH22.HTM, Date of Access 04/09/2003
    [11]
    Lange, D. & Oshima, M. 1998, Programming and Deploying Java Mobile Agents with Aglets, Addison-Wesley.
    [12]
    Lange, D. 1999, 'Seven Good Reasons for Using Mobile Agents', In Communication of ACM, vol. 42, no. 3, pp. 88--89.
    [13]
    Milojicic, D. et. al. 1998, 'MASIF The OMG Mobile Agent System Interoperability Facility', In Proceedings of Second International Workshop, LNCS No 1477.
    [14]
    Ousterhout, J. K. 1994, TCL and the TK ToolKit. Addison-Wesley. Reading MA.
    [15]
    Page, J., Zaslavsky, A., & Indrawan, M. 2003, 'Security Aspects of Software Agents in Pervasive Information Systems', In Proceedings of the 14th Australasian Conference on Information Systems (ACIS 2003), To appear.
    [16]
    Page, J., Zaslavsky, A., & Indrawan, M. 2003, 'Evaluating Security in Software Agent Systems using a Security Analysis Tool', In Proceedings of the 1st Australian Information Security Management Conference (InfoSec 2003). To appear.
    [17]
    Qusay, M. 2000, 'Security Policy: A Design Pattern for Mobile Java Code', In Proceedings of the Seventh PLOP Conference Washington University Technical Report number: wucs-00-29. URL http://jerry.cs.uiuc.edu/~plop/plop2k/proceedings/Mahmoud/Mahmoud.pdf, Date of Access 12/03/2003
    [18]
    Roth, V. 1998, 'Secure Recording of Itineraries Through Cooperating Agents', In Proceedings of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations', pp. 147--154.
    [19]
    Truszkowski, W. & Rouff, C. 'New Agent Architecture for Evaluation in Goddard's Agent Concepts Testbed', Date of Access 12/09/2003, URL http://agents.gsfc.nasa.gov/papers/pdf/aap41.pdf
    [20]
    Wheeler, T. 'Developing Peer Applications With Voyager. A white paper' URL http://www.recursionsw.com/products/voyager/whitepapers/Developing%20PeerApplications%20With%20Voyager.pdf, Date of Access 03/08/2003
    [21]
    Wong, D., Paciorek, N., Walsh, T., DiCelie, J., Young. M. & Peet. B. 1997, 'Concordia: An infrastructure for collaborating mobile agents', In Proceedings of the First International Workshop on Mobile Agents, Germany, LNCS 1219.

    Cited By

    View all
    • (2017)Context-awareness security model based on multi-agents system operating in complex environmentProceedings of the Second International Conference on Internet of things, Data and Cloud Computing10.1145/3018896.3036382(1-8)Online publication date: 22-Mar-2017
    • (2014)Self-reliant mobile codeJournal of Network and Computer Applications10.1016/j.jnca.2013.01.00437(62-75)Online publication date: 1-Jan-2014
    • (2006)DominoProceedings of the 4th international conference on Pervasive Computing10.1007/11748625_10(153-168)Online publication date: 7-May-2006

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image DL Hosted proceedings
    ACSW Frontiers '04: Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
    January 2004
    192 pages

    Publisher

    Australian Computer Society, Inc.

    Australia

    Publication History

    Published: 01 January 2004

    Author Tags

    1. community
    2. malicious
    3. mobile agents (MA)
    4. security
    5. vulnerability

    Qualifiers

    • Article

    Conference

    ACSW Frontiers '04

    Acceptance Rates

    Overall Acceptance Rate 204 of 424 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)27
    • Downloads (Last 6 weeks)4

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Context-awareness security model based on multi-agents system operating in complex environmentProceedings of the Second International Conference on Internet of things, Data and Cloud Computing10.1145/3018896.3036382(1-8)Online publication date: 22-Mar-2017
    • (2014)Self-reliant mobile codeJournal of Network and Computer Applications10.1016/j.jnca.2013.01.00437(62-75)Online publication date: 1-Jan-2014
    • (2006)DominoProceedings of the 4th international conference on Pervasive Computing10.1007/11748625_10(153-168)Online publication date: 7-May-2006

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media