Font Size: a A A

Mobile Agent System Security Technologies

Posted on:2005-06-25Degree:MasterType:Thesis
Country:ChinaCandidate:H Z PengFull Text:PDF
GTID:2208360125961197Subject:Computer applications
Abstract/Summary:PDF Full Text Request
Mobile Agent is a special kind of Agent, featuring the most fundamental characteristics of intellective Agentę¢¤eaction, autotnomy, targeted-oriented and environmental-directed, including mobility as it can travel automously form one host to another on network, representing users to do the specified job. Mobile agent can travel in the software/hardware network environment. Mobile agent system, offering basic running surroundings for MA, is a software platform where Mobile Agent is created, executes, communicates, migrates and terminates.The "migrate-compute-migrate" work-mode as well as communication and cooperation among agents provide a new complete solution for the Internet-based distributed computing applications. This new paradigm can be widely used in distributed applications based on the Internet and Intranet such as distributed information retrieval, personal assistance, workflow layout, electronic commerce, mobile computing and system management. Institutions in many companies and universities have already produced their own mobile agent systems, but it still needs time to put them into real commercial use. One of the main restrictions is the security problem of the mobile agent system.The security problem of the mobile agent system can be divided into three sub-problems.(1)security problem of mobile agent' s migration and communication(2)protection of mainframe platform from intruding by malice agents(3) agent' s self-protection.On the bases of many presented MA security approaches, we designed a new type of safe MA-SHMTU system, providing our own security approaches by careful researches on the three security sub-problems above. Concerning about security problems of MA' s immigration and communication, our system protects it during the process by EMFS (efficiently message forwarding scheme) on the foundation of ATP (Agent Transfer Protocol) ; To protect the mainframe from being invaded by malice agents, SHMTU divides resources into tow classes of systematic and application. Combining the advantages of the security manager and wrapper, we use the former to manage systematical resources, and the latter for application. It provides bi-protection for host resources through Security Manager, Wrapper and Proxy; MA itself is protected by the following two kinds of mechanisms: one is that the status of agent is set Read-only access by some procedures. For example, while MA immigrates in a settled route, any attack that tries to distort the Read-only status will be detached;another one is that a limited black-box created by proxy will protect our related information of Agent. Finally we introduce the implementing methods of each security mechanisms as well as a application.Penghaide(Computer Application) Directed by Shixiaohong...
Keywords/Search Tags:mobile agent, mobile agent system, SHMTU system, EMFS, Security Manager, Wrapper, limited black-box
PDF Full Text Request
Related items