An Effective Method for Protecting the Integrity of Mobile Agent

H. YARAHMADI, M. KAMANKESH
1.674 457

Abstract


Abstract. A mobile agent is software which performs an action autonomously and independently as a person or organizations assistance. Mobile agents are used for searching information, retrieval information, filtering, intruder recognition in networks, and so on. One of the important issues of mobile agent is their security. It must consider different security issues in effective and secured usage of mobile agent. One of those issues is the integrity’s protection of mobile agents.In this paper, the advantages and disadvantages of each method, after reviewing the existing methods, is examined. Regarding to this matter that each method has its own advantage or disadvantage, it Seems that by combining these methods and using Agents Attributes  one can reach to a better method for protecting the integrity of mobile agents. Therefore, this method is provided in this paper and then is evaluated in terms of existing method. Finally, this method is simulated and its results are the sign of improving the possibility of integrity’s protection of mobile agents.


Keywords


Integrity, Mobile Agent, Security, Cooperating

Full Text:

PDF


References


Martin L. Griss , “ Software Agents as Next Generation SoftwareComponents,” Component-based Software Engineering: Putting the

Pieces Together, pp.: 641–657.

Borselius N., “Mobile agent security,” Electronic & Communication Engineering Journal, Vol. 14, No. 5, 2002.

Jansen W., “C ountermeasures for Mobile Agent Security,” Componentbased Software Engineering.

Bierman E., Cloete E., “Classification of Malicious Host Threats in Mobile Agent Computing,” ACM International Conference, Vol. 30, p.:141-148, 2002.

Roth V., “On the Robustness of Some Cryptographic Protocol for Mobile Agent Protection,” The Second Int. Joint Conference on Autonomous Agents and Multiagent Systems, Melbourne, Australia, pp.:851-858, 2003.

Acquisti A., William J., Van Hoof R., Scott M., Sierhuis M., “ Brahms Tutorial version 1.00,” 2003.

Grand M., “Java Language Reference,” ISBN: 1-56592-326-x, 450 pages, 1997. World Academy of Science, Engineering and echnology Vol:2 2008-06-28 566 International

Yarahmadi H., Dehghan M., "A Hybrid Method for Protecting the Integrity of Mobile Agents," 12th Annual International Computer Society of Iran Computer Conference, CSICC 2007, Tehran, Iran, PP. 1933-1938, 20-22 Feb. 2007