Browse > Article

Design & Implementation of Secure Mobile Agent Gateway  

Park, Jae-Kyoung ((주)퓨쳐시스템 정보통신연구소)
Won, Yoo-Hun (홍익대학교 전산학과)
Abstract
In the course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is use of mobile agents. The mobile agent is capable of migrating autonomously from node to node in the network, to perform some computation on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It also however, suffers from a major drawback, namely, the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describe the design & implementation of secure mobile agent gateway that split and merge the agent cede with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.
Keywords
Security; Mobile Agent; MAG; VPN;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 D.C, Chess, C. Harrison, A. Kershenbaum, 'Mobile Agents:Are They a Good Idea?', IBM Research Report, 1995
2 R. S. Gray, 'Agent Tcl: A flexible and secure mobile-agent system', Proceedings of Fourth Annual Usenix Tcl', Workshop, pp. 9-23, 1996
3 Stefan Funfrocken, 'Protecting Mobile Web-Commerce Agents with Smartcard', Mobile Security Agent, LNCS 1419, 1999, springer, pp. 44-64, Giovanni Vigna (Ed.)
4 Jae-Kyoung Park, Yoo-Hun Won, 'Protecting Mobile Agent with VPN', 2001. 6, 情報保護學會論文誌 第 11券 第3號   과학기술학회마을
5 F. Hohl, 'A model of Attacks of Malicious Hosts Against Mobile Agents', presented at 4th Workshop on Mobile Object Systems Secure Internet Mobile Computations, France, 1998
6 Jian Tang, Jari Veijalainen, 'Using Agents to Improve Security and Convenience in mobile E-Commerce', Proceedings of the 34th Hawaii International Conference on System Science-2001, 2001 IEEE
7 Crystaliz Inc., General Magic Inc., GMD Fokus, IBM Corp., 'Mobile Agent Facility Specipication', Joint Submission Supported by the Open Group, OMG TC Document, November 1997
8 Panayiotis Kotzanikolaou, 'Secure Stansactions with Mobile Agents in Hostile Environments', pp. 193-202, 1999 IEEE
9 Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, 'Security Issues In Mobile Agent Technology', http://www.lia.deis.unibo.it/Software/SOMA
10 Niranjan Suri, 'NOMADS:Toward a Strong and Safe Mobile Agent System', Agent 2000 Barcelona Spain, pp. 163-164, ACM 2000   DOI
11 Hartmut Vogler, Thomas Kunkelmann, Marie-Louise Moschgath, 'An Approach for Mobile Agent Security and Fault Tolerance using Distributed Transactions', Proceedings of the 1997 International Conference on Parallel and Distributed Systems, pp. 268-274, 1997 IEEE   DOI
12 S. Kent, R. Atkinson, 'IP Encapsulating Security Payload(ESP)', November 1998, RFC 2406, available at http://www.cis.ohio-state.edu/Service/rfc/rfc-text/rfc2406.txt
13 D. Maughan, M. Schertler, M. Schneider, J. Turner, 'Internet Security Association and Key Management Protocol (ISAKMP)', November 1998, RFC 2408, available at http://www.cis.ohio-state.edu/Service/rfc/rfc-text/rfc2408.txt
14 D. Harkins, D. Carrel, 'The Internet Key Exchange (IKE)', November 1998, RFC 2409, available at http://www.cis.ohio-state.edu/Service/rfc/rfc-text/rfc2409.txt
15 S. Kent, R. Atkinson, 'IP Authentication Header', November 1998, RFC 2402, available at http://www.cis.ohiostate.edu/Service/rfc/rfc-text/rfc2402.txt
16 Casey Wilson, Peter Doak, 'Creating and Implementing Virtual Private Network', pp. 379-418, 2000, CORIOLIS (Ed.)