A New Approach based on Cryptography and XML Serialization for Mobile Agent Security

Hind Idrissi, Arnaud Revel, El Mamoun Souidi

Abstract

Mobile agents are a special category of software entities, with the capacity to move between nodes of one or more networks. However, they are subject to deficiency of security, related particularly to the environments on which they land or other malicious agents they may meet on their paths. Security of mobile agents is divided into two parts, the first one relates to the vulnerabilities of the host environment receiving the agent, and the second one is concerning the malevolence of the agent towards the host platform and other agents. In this paper, we will address the second part while trying to develop an hybrid solution combining the two parts. A solution for this security concern will be presented and performed .It involves the integration of cryptographic mechanisms such as Diffie-Hellman key exchange for authentication between the set (platform, agent) and the Advanced Encryption Standard (AES) to communicate the data with confidentiality. These mechanisms are associated with XML serialization in order to ensure easy and persistent portability across the network, especially for non permanent connection.

References

  1. Ahuja, P. and Sharma, V. (2012). A review on mobile agent security. International Journal of Recent Technology and Engineering (IJRTE), pages 2277-3878.
  2. Aumasson, J. (2006). On the pseudo-random generator isaac. IACR Cryptology ePrint Archive, 2006:438.
  3. Chen, B. and Cheng, H. (2010). A review of the applications of agent technology in traffic and transportation systems. Intelligent Transportation Systems, IEEE Transactions on, 11(2):485-497.
  4. D. Gavalas, G. T. and Anagnostopoulos, C. (2009). A mobile agent platform for distributed network and systems management. Journal of Systems and Software, 82(2):355-371.
  5. D. Mitrovic, M. Ivanovic, Z. B. and Vidakovic, M. (2011). An overview of agent mobility in heterogeneous environments. In Workshop Proceedings on Applications of Software Agents, page 52.
  6. D.B. Lange, M. Oshima, G. K. and Kosaka, K. (1997). Aglets: Programming mobile agents in java. In Worldwide Computing and Its Applications, pages 253-266. Springer.
  7. Diffie, W. and Hellman, M. (1976). New directions in cryptography. Information Theory, IEEE Transactions on, 22(6):644-654.
  8. Eastlake, D. and Jones, P. (2001). Us secure hash algorithm 1 (sha1).
  9. F. Bellifemine, A. P. and Rimassa, G. (2001). Jade: a fipa2000 compliant agent development environment. In Proceedings of the fifth international conference on Autonomous agents, pages 216-217. ACM.
  10. Fasli, M. (2007). Agent technology for e-commerce. John Wiley & Sons Chichester.
  11. Ferber, J. (1999). Multi-agent systems: an introduction to distributed artificial intelligence, volume 1. AddisonWesley Reading.
  12. Gallagher, P. (2009). Digital signature standard (dss). Federal Information Processing Standards Publication, FIPS PUB, pages 186-3.
  13. Gray, R. (1997). Agent tcl: A flexible and secure mobileagent system.
  14. Gray, R. and al (2001). Mobile-agent versus client/server performance: Scalability in an information-retrieval task. In Mobile Agents, pages 229-243. Springer.
  15. J. White, J. (1995). Telescript technology: An introduction to the language. General Magic White Paper, General Magic.
  16. Jansen, W. and Karygiannis, T. (1998). Mobile agent security. Technical report, National Institute of Standards and Technology.
  17. Mousa, A. and Hamad, A. (2006). Evaluation of the rc4 algorithm for data encryption. IJCSA, 3(2):44-56.
  18. Phan, R.-W. (2005). Fixing the integrated diffie-hellmandsa key exchange protocol. Communications Letters, IEEE, 9(6):570-572.
  19. Robertazzi, T. (2012). Advanced encryption standard (aes). In Basics of Computer Networking, pages 73-77. Springer.
  20. S. Poslad, P. B. and Hadingham, R. (2000). The fipa-os agent platform: Open source for open standards. In Proceedings of the 5th International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents, volume 355, page 368.
Download


Paper Citation


in Harvard Style

Idrissi H., Revel A. and Souidi E. (2014). A New Approach based on Cryptography and XML Serialization for Mobile Agent Security . In Proceedings of the 6th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART, ISBN 978-989-758-015-4, pages 403-411. DOI: 10.5220/0004812004030411


in Bibtex Style

@conference{icaart14,
author={Hind Idrissi and Arnaud Revel and El Mamoun Souidi},
title={A New Approach based on Cryptography and XML Serialization for Mobile Agent Security},
booktitle={Proceedings of the 6th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,},
year={2014},
pages={403-411},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004812004030411},
isbn={978-989-758-015-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 6th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,
TI - A New Approach based on Cryptography and XML Serialization for Mobile Agent Security
SN - 978-989-758-015-4
AU - Idrissi H.
AU - Revel A.
AU - Souidi E.
PY - 2014
SP - 403
EP - 411
DO - 10.5220/0004812004030411