By assuming the use of mobile software agents the
scenario starts with the creation of the agent(s) by the
user. The user provides the agents the necessary infor-
mation which enables them to visit the prefered mer-
chants, be ability to collect information from those
merchients and make a decision on the collected in-
formation. After executing the agents they return to
the user with the computed result.
The solution to our agent model should fulfill the
following requirements. The collected information
from the merchants should be hidden for other mer-
chants. For example, in the case of collecting offers
from airline companies, these companies should not
be able to offer a price for a ticket based on already
collected offers from other companies. The goal is
therefore to have confidentiality of the retrieved of-
fers.
Agents should also not reveal the full list of mer-
chients they are planning to visit (itinerary), conse-
quently the itinerary should be tamper-proof.
Also, the amount of network traffic the agents gen-
erate should be minimized. Especially the interaction
with the users due to the use of a mobile device which
has minimum computational powers.
The final requirement is related to the tampering
of the malicious merchants. As stated, one cannot
prevent tampering of the agent by the merchant, but
it should be the case that any merchant should be able
to detect malicious activity.
The assumptions of this agent model are that there
is a Public Key Infrastructure (PKI) available for the
distribution of the public keys of all participants. This
agent model does not consider a denial of service at-
tack and it also assumes that not all merchants collude
with each another.
3 APPROACH
An optimal solution to the problem described in sec-
tion 2, in the sense of minimal network traffic, would
be to use a single mobile agent which hops from
one merchant to another without interacting with his
owner. The problem with this solution is that the
agent is carrying all private information of the user
and therefore it is likely to be reveal private infor-
mation if it is tampered with e.g. using a replay at-
tack. By deploying multiple agents and sending to
every merchant a different agent, tampering can be
deteceted and no private information will leak. The
downside to this solution is the increase in network
traffic. Considering the above solutions, it would be
desirable to develop a trade-off between these solu-
tions. How many agents are there needed to meet the
requirements of section 2?
The approach of this paper is based on beehive
organization where there is one queen who makes the
decisions and multiple drones that do the actual work.
These two types of agents can shortly be characterized
as:
• Drone An agent that can only collect data but does
not have any decision making logic
• Queen An agent that takes the output of the
drone(s) and makes a decision based on that data
By splitting up the tasks of the agents and letting a
drone collect information from various merchants, the
private information of the owner cannot be revealed,
because the drone is not able to process collected data
e.g. match with previously collected offers and decid-
ing which of the offers is the maximum. This process
in only available with the queen. The gathering of
information is a rather neutral activity however and
sending only a drone to collect the information will
keep the decision logic well away from the malicious
environments.
The queen, which does carry the decision logic,
will not pass any malicious hosts. Rather, it is exe-
cuted on a fixed host HQ and is quite immobile com-
pared to the drone. The queen will thus travel only to
a curious host where it waits for the drone’s arrival.
Once the drone and queen are together they will make
a decision on the best offer. See figure 1.
There is also a third agent involved, called the
helper-agent, which will be involved when the drone
cannot be sent to its next destination. This helper-
agent will also reside on a curious host (which can ei-
ther be the same or a different host as where the queen
resides) but will not move from there. The helper-
agent is only needed when a host H
i
in the drone’s
itinerary does not function, otherwise the helper-agent
will just shut down after a pre-determined time.
This paper is based on (Singel
´
ee and Preneel,
2004) which present a mobile agents scenario that
can securely collect information, protect the collected
information against untrusted hosts, and it can digi-
tally sign transactions in an untrusted environment. In
order to protect different aspects of the agent model
a variety of cryptographic techniques and concepts
is needed. None of the protocols are described
at algorithm level, which means that a suitable
algorithm can be chosen whenever a hash-function
or encryption algorithm is used. The encryption of a
value v with a symmetric encryption algorithm using
key K is denoted as E
K
(v), whereas the encryption of
the value using the public key of a particular host H
i
is denoted as E
H
i
(v) (or E
P
H
i
(v)). A digital signature
over a value v with host H
0
i
s private key will be
PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS
291