DESIGN, IMPLEMENTATION AND TESTING OF MOBILE AGENT PROTECTION MECHANISM FOR MANETS

Khaled E. A. Negm

Abstract

In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host. So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very recommended for the types of transactions that needs highly secure environments, e. g., business to business, stock market updates, and any real time data synchronization.

References

  1. Bellare, M. et al (1997). S. Goldwasser, and D. Micciancio, “Pseudo-Random Number Generation with Cryptographic Algorithms: the DSS Case, Crypto 97, LNCS 1294, pp. 1-12.
  2. Buschmann, F., et al (1996). Pattern-Oriented Software Architecture: A System of Patterns, John Wiley, UK.
  3. CVE (2005). Common Vulnerability Exposure http://cve.mitre.org/.
  4. ElGamal, T. (1984). A public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, Proc. of Crypto 7884, LNCS 196, pp. 10-18.
  5. Farmer, W. et al (1996). Security for Mobile Agents: Issues and Requirements. In Proc. of the 19th International Information Systems Security Conference, pp. 591-597.
  6. FIPA (1998). Agent Management,. Specification, part 1, ver. 2.0, Foundation for Intelligent Physical Agents, 1998.
  7. Fuggetta, G, and G. Vigna (1998). Understanding Code Mobility, IEEE Transactions on Software Engineering, 24, pp. 342-361.
  8. Gray, R., (1998). D'Agents: Security in a Multiple Language, Mobile-Agent System, in Mobile Agents and Security, G. Vigna, ed., LNCS 1419 pp. 154-187, Springer.
  9. Negm, K. A. E. (2003). Implementation of Secure Mobile Agent for Ad-Hoc Networks, WEAS Transactions on Communications, Vol. 2, pp. 519-526.
  10. Negm, K. A. E., and W. Adi (2004). Secure Mobile Code Computing in Distributed Remote Environment, Proc. 2004 IEEE International Conference on Networking, Sensing and Control, pp. 270-275.
  11. OMG-TC (1997). Mobile Agent System Interoperability Facilities Specification, OMG-TC-orbos/97, 1997.
  12. Roth, V., (2000). Scalable and Secure Global Name Services for Mobile Agents,” 6th ECOOP Workshop on Mobile Object Systems: Operating System Support, Security and Programming Languages.
  13. Sielken, R. (1999). Application Intrusion Detection, Univ. of Virginia Computer Science Technical Report CS99-17.
  14. TG (2004).Traffic Generator, http://www.postel.org/services.html.
  15. Tripathi, A. et al (1999), N. Karnik, N. Vora, T. Ahmed, R. Singh, Mobile Agent Programming in Ajanta, Proc. of 19th IEEE International Conference on Distributed Computing Systems, pp. 190-197.
  16. Vincenzetti, D. and M. Cotrozzi 1993. ATP anti tampering program, in Edward DeHart, ed., Proc. of Security IV Conf.-USENIX Assoc., pp 79-90.
  17. White, J. 1997. Mobile Agents,” in Software Agents (J. Bradshow, ed.) 437-472, MIT Press.
Download


Paper Citation


in Harvard Style

E. A. Negm K. (2005). DESIGN, IMPLEMENTATION AND TESTING OF MOBILE AGENT PROTECTION MECHANISM FOR MANETS . In Proceedings of the First International Conference on Web Information Systems and Technologies - Volume 1: WEBIST, ISBN 972-8865-20-1, pages 154-161. DOI: 10.5220/0001236301540161


in Bibtex Style

@conference{webist05,
author={Khaled E. A. Negm},
title={DESIGN, IMPLEMENTATION AND TESTING OF MOBILE AGENT PROTECTION MECHANISM FOR MANETS},
booktitle={Proceedings of the First International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,},
year={2005},
pages={154-161},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001236301540161},
isbn={972-8865-20-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the First International Conference on Web Information Systems and Technologies - Volume 1: WEBIST,
TI - DESIGN, IMPLEMENTATION AND TESTING OF MOBILE AGENT PROTECTION MECHANISM FOR MANETS
SN - 972-8865-20-1
AU - E. A. Negm K.
PY - 2005
SP - 154
EP - 161
DO - 10.5220/0001236301540161