Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29414


Select areas to restrict search in scientific publication database:
10009528
An Approach to Secure Mobile Agent Communication in Multi-Agent Systems
Abstract:
Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.
Digital Object Identifier (DOI):

References:

[1] Singh, Parwinder, & Malhotra, Mrs Sheenam. (2013). Trends in Mobile Agent Communication for Mobile Networks. International Journal, 3(5).
[2] Cavalcante, Rodolfo Carneiro, Bittencourt, Ig Ibert, da Silva, Alan Pedro, Silva, Marlos, Costa, Evandro, & Santos, Robério. (2012). A survey of security in multi-agent systems. Expert Systems with Applications, 39(5), 4835-4846.
[3] Lee, Xuan Hung, Khalid, Murad, Sankar, Ravi, & Lee, Sungyoung. (2011). An efficient mutual authentication and access control scheme for wireless sensor networks in healthcare. Journal of Networks, 6(3), 355-364.
[4] Kandil, Heba, & Atwan, Ahmed. (2014). Mobile agents' authentication using a proposed light Kerberos system. Paper presented at the 9th International Conference on Informatics and Systems (INFOS).
[5] Niklas Borselius and Chris J. Mitchell (2003). Securing FIPA agent communication. In H. R. Arabnia and Y. Mun, editors, Proceedings of the 2003 International Conference on Security and Management (SAM’03), Vol. 1, pages 135–141. CSREA Press, Nevada.
[6] Hu, Yuh-Jong, & Tang, Chao-Wei. (2003). Agent-oriented public key infrastructure for multi-agent E-service. Paper presented at the 7th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, pp 114–136.
[7] Novak, P., Rollo, M., Hodik, J., & Vlcek, T. (2003). Communication security in multi-agent systems. Multi-Agent Systems and Applications III, Proceedings, 2691, 454-463.
[8] Quillinan, Thomas B, Warnier, Martijn, Oey, Michel, Timmer, Reinier, & Brazier, Frances. (2008). Enforcing security in the agentscape middleware. Paper presented at the Proceedings of the 2008 workshop on Middleware security.
[9] Xiao-Long, Xu, Jing-Yi, Xiong, & Chun-Ling, Cheng. (2010). The model and the security mechanism of the information retrieval system based on mobile multi-agent. Paper presented at the 12th IEEE nternationalConference on Communication Techology (ICCT).
[10] Sulaiman, Rossilawati, & Sharma, Dharmendra. (2011). Enhancing security in e-health services using agent. Paper presented at the 2011 IEEE International Conference on Electrical Engineering and Informatics (ICEEI).
[11] Sulaiman, Rossilawati, Huang, Xu, & Sharma, Dharmendra. (2009). E-health services with secure mobile agent. Paper presented at the 7th Annual Communication Networks and Services Research Conference, pp 270-277.
[12] Krishnalal, G, & Babu, Jisha. (2013). A Secure Data Transmission For Multiagent System Using Digital Signature. Paper presented at the International Journal of Engineering Research and Technology, pp 4-7.
[13] Ben Ameur, Sirine, Zarai, Faouzi, Smaoui, Salima, Obaidat, Mohammad S, & Hsiao, KF. (2014). A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme. Paper presented at the 4th IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC).
[14] Venkatesan, S, & Chellappan, C. (2008). Protection of mobile agent platform through attack identification scanner (AIS) by malicious identification police (MIP). Paper presented at the First International Conference on Emerging Trends in Engineering and Technology, 2008. ICETET'08.
[15] Venkatesan, S, Chellappan, C, Vengattaraman, T, Dhavachelvan, P, & Vaish, Anurika. (2010). Advanced mobile agent security models for code integrity and malicious availability check. Journal of Network and Computer Applications, 33(6), 661-671.
[16] Bellifemine, Fabio, Caire, Giovanni, Trucco, Tiziana, Rimassa, Giovanni, & Mungenast, Roland. (2003). Jade administrator’s guide. TILab (February 2006).
Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007