Loading

Towards A New Security Architecture of Mobile Agents
Hassan Razouki1, Abdellatif Hair2
 
1Hassan RAZOUKI, Laboratory of Modeling and Computation (LMC), Faculty of Science and Technology, University Sultan Moulay Slimane, Beni Mellal, Morocco.
2Abdellatif HAIR, Laboratory of Modeling and Computation (LMC), Faculty of Science and Technology, University Sultan Moulay Slimane, Beni Mellal, Morocco.
Manuscript received on December 08, 2014. | Revised Manuscript received on December 15, 2014. | Manuscript published on January 05, 2014. | PP:55-60 | Volume-3 Issue-6, January 2014. | Retrieval Number: F1983013614/2014©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Security presents a crucial point in mobile agent systems and may hinder the expansion and use of this paradigm. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechanisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms. The first is a static adaptation performed by the MSAS (the Management System of Agents Security). The second is a reflexive structural dynamic adaptation performed by the mobile agent itself. These two adaptations take into account the dynamic security requirements in systems based on mobile agent.
Keywords: Mobile agent, Software components, Static adaptation, Dynamic adaptation, Security, Trusted platform, Cryptography.