A Framework of Agent Protection Protocol for Secure Execution of Mobile Agent

  • Published : 2004.04.01

Abstract

As an agent is applied into various fields, it is suggested as the paradigm of new application technology in the area of computer communication. However, the mobile agent brines the problem of security on an agent due to mobility. This study proposals the mobile agent protection protocol framework for more effective protection and safety. The designed Framework of protocol uses the public ky, the private key and the digital signature in PKI environment based on JAVA. This is the mechanism accomplishing safely the work of an agent by tracking the pattern of execution and the mobility plan through the VS(verification server). This also secures the suity and the flawlessness of an agent through the VS guaranteeing safety from malicious attacks.

에이전트는 다양한 분야에 적용이 가능하기 때문에 컴퓨터 통신 분야의 새로운 응용기술의 패러다임으로 제시되었다. 그러나 이동 에이전트는 이동성으로 인하여 에이전트에 대한 보안에 대한 문제가 제기되었다. 본 논문은 이동 에이전트를 보다 효과적인 보호와 안전성을 보장할 수 있는 이동 에이전트 보호 프로토콜의 프레임워크를 제안한다. 설계된 프로토콜은 JAVA기반의 PKI환경에서 공개키와 개인키 그리고 전자서명을 이용한다. 이는 VS를 통하여 에이전트의 실행 패턴과 이동계획의 패턴을 추적하여 안전하게 에이전트 임무 수행을 하는 메커니즘이다. 또한 악의적인 공격으로부터 안전함을 인증하는 VS을 통해서 에이전트의 무결성과 기밀성을 보장한다.

Keywords

References

  1. P. Dasgupta, L. E. Moser, P. M. Melliarsmith, 'MagNet:Mobile Agents for Networked Electronic Tracing', IEEE Transaction on Knowledge and Data Engineering, Vol. 11, No.4, July, 1991
  2. A. Villazon and W.Binder, 'Portable Resource Reification in Java-based Mobile Agent Systems', In Mobile Agents : Proc. of the 5th International Conference, Number 2240 in LNCS, Springer-Verlag, Altanta, USA, 2001
  3. H. K. Tan, L. Moreau, 'Extending Execution Tracing for Mobile Code Security', In Proc. of the 2nd International Workshop on Security in Mobile Miti-Agent Systems, associated to AAMAS-2002, Bologna, Italy, July, 2002
  4. F. Hohl, 'Time Limited Blackbox Security : Protecting Mobile Agents from Malicious Hosts', G. Vigna (Ed), in Proceeding of Mobile Agents and Security, Springer-Verlag, Lecture Notes in Computer Science No.1419, pp.92-11, 1998 https://doi.org/10.1007/3-540-68671-1_6
  5. T. Taka, T. Mizuno, T. Watanabe, 'A Model of Mobile Agent Services' in enhanced for the International Conference on Parallel and Distributed Systems, pp. 274-281, 1998
  6. C. Raibulet, C. Demartini, 'Mobile Agent Technology for the Management of Distributed System-a Case Study', in Journal of Computer Networks Vol.34, pp.823-830, 2000 https://doi.org/10.1016/S1389-1286(00)00153-5
  7. V. Roth, 'Secure Recording of Itineraries through Co-operation Agents', in Proceeding of the ECOOP Workshop on Distributed Object Security and 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, pp.147-154, INRIA, Frince, 1998
  8. J. Alesheimer, C. Cachin, J. Camenisch, G. Karjoth, ' Crytographic Security for Mobile Code', In Proc. IEEE Symposium on Security and Privacy(S&P 2001), pp.2-11, may, 2001
  9. H. Reiser, G. Vogt, 'Security Requirments for Management System using Mobile Agents', In the Proc. of the 5th IEEE Symposium on Computer and Communication:ISCC 2000, Antibes, France, July, 2000
  10. C. R. Jung, J. G. Koh. 'Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status', in the Journal of KICS, Korea, Vol.28, No.7C, pp.743-751, 2003
  11. T. Sander, C. Tschudin, 'Towards Mobile Cryptography', In Proc. of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, May, 1998
  12. G. Vigna, 'Cryptographic Traces for Mobile Agents', Mobile Agents and Security, pp.137-153, LNCS1419, Springer -verlag, 1998