Securing Mobile Agent Based Tele-Assistance Systems

Sergio Pozo, Rafael. M. Gasca, María Teresa Gómez

2004

Abstract

Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives for using agents in real environments which need a solution for some of their security problems. Companies offering assistive service are getting cost reduction due to tele-assistive technologies. In this paper we present a proposal based on secure tunnels to add confidentiality and integrity to any agent platform, present or future, without making any changes to its source-code. Our system is currently implemented and working as part of a complete mobile multi-agent system used for tele-assistance. During our research we have also detected many other problems regarding the tunnelling approach.

References

  1. W. Jansen, T. Karygiannis: Mobile Agent Security. NIST Special Publication 800-19, October 1999.
  2. L. M. Silva, P. Simoes, G. Soares, P. Martins, V. Batista, C. Renato, L. Almeida, N. Stohr: JAMES: A Platform for Moble Agents for the Management of Telecommunication Networks. Proceedings Intelligent Agents for Telecommunication Applications, IATA'99, Stockholm, Sweden, August 1999.
  3. A. Puliafito, O. Tomarchio: Design and Development of a Practical Security Model for Mobile Agent System. 7th IEEE International Symposium on Computers and Communications, ISCC'02.
  4. S. Fischmeister, G. Vigna, R. A. Kemmerer : Evaluating the Security of Three Java-Based Mobile Agent Systems. 5th IEEE International Conference on Mobile Agents (MA'01). Atlanta, Georgia, USA, December 2001.
  5. R. Wahbe, S. Lucco, T. Anderson: Efficient Software-Based Fault Isolation, October 1998.
  6. W. Farmer, J. Guttman, V. Swarup: Security for Mobile Agents: Authentication and State Appraisal. Proceedings of the 4th European Symposium on Research in Computer Security (ESORICS), September 1996.
  7. J. J. Ordille: When Agents Roam, Who Can You Trust? Proceedings of the First Conference on Emerging Technologies and Applications in Communications, May 1996.
  8. D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris, G. Tsudik: Itinerant Agents for Mobile Computing. IEEE Personal Communications, vol.2, no. 5, October 1995.
  9. G. Necula, P. Lee: Safe Kernel Extensions Without Run-Time Checking. Proceedings of the 2nd Symposium on Operating System Design and Implementation (OSDI), October 1996.
  10. G. Vigna: Protecting Mobile Agents Through Tracing. Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, June 1997.
  11. J. Riordan, B. Schneier: Environmental Key Generation Towards Clueless Agents. Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science No. 1419, 1998.
  12. T. Sander, C. Tschdin: Protecting Mobile Agents Against Malicious Hosts. Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science No. 1419, 1998.
  13. F. Hohl: Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science No. 1419, 1998.
  14. D. B. Lange, M. Oshima: Programming and Deploying Java Mobile Agents with Aglets. Addison-Wesley, 1998. ISBN 0-201-32582-9.
  15. J. Altmann, F. Gruber, L. Klug, W. Stockner, E. Weippl: Using Mobile Agents in Real World: A Survey and Evaluation of Agent Platforms. 5th International Conference on Autonomous Agents, 2nd Workshop on Infrastructure for Agents, MAS, and Scalable MAS at Autonomous Agents. Montreal, Canada, May 2001.
  16. W. Wong: Stunnel: SSLing Internet Services Easily. SANS Institute, November 2001.
  17. A. Pankratov: Trivial Denial of Service Attack against TCP-based VPN. Security Focus, April 2003.
  18. N. Rinsema: Secure (and free) IP Tunneling using Zebedee. SANS Institute, June 2001.
  19. M. Zalewski: Strange Attractors and TCP/IP Sequence Number Analysis. BlindView Corporation, 2001.
Download


Paper Citation


in Harvard Style

Pozo S., M. Gasca R. and Teresa Gómez M. (2004). Securing Mobile Agent Based Tele-Assistance Systems . In Proceedings of the 1st International Workshop on Tele-Care and Collaborative Virtual Communities in Elderly Care - Volume 1: TELECARE, (ICEIS 2004) ISBN 972-8865-10-4, pages 63-72. DOI: 10.5220/0002666000630072


in Bibtex Style

@conference{telecare04,
author={Sergio Pozo and Rafael. M. Gasca and María Teresa Gómez},
title={Securing Mobile Agent Based Tele-Assistance Systems},
booktitle={Proceedings of the 1st International Workshop on Tele-Care and Collaborative Virtual Communities in Elderly Care - Volume 1: TELECARE, (ICEIS 2004)},
year={2004},
pages={63-72},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002666000630072},
isbn={972-8865-10-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Workshop on Tele-Care and Collaborative Virtual Communities in Elderly Care - Volume 1: TELECARE, (ICEIS 2004)
TI - Securing Mobile Agent Based Tele-Assistance Systems
SN - 972-8865-10-4
AU - Pozo S.
AU - M. Gasca R.
AU - Teresa Gómez M.
PY - 2004
SP - 63
EP - 72
DO - 10.5220/0002666000630072