Inter-confidentiality protection of agent communication in multi-agent system based applications
Mobile agent interaction is usually vulnerable to attacks from within and outside the agent’s execution environment. Also, the mobility property of mobile agents earns them the opportunity to migrate from one security domain to another. Intranet/LAN with connection to internet do, from time to time,...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Penerbit UTM Press
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/56008/1/ShukorAbdulRazak2015_InterConfidentialityProtectionofAgentCommunication.pdf http://eprints.utm.my/id/eprint/56008/ http://dx.doi.org/10.11113/jt.v77.6319 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
id |
my.utm.56008 |
---|---|
record_format |
eprints |
spelling |
my.utm.560082017-11-01T04:16:42Z http://eprints.utm.my/id/eprint/56008/ Inter-confidentiality protection of agent communication in multi-agent system based applications Ogunnusi, Olumide Simeon Abd. Razak, Shukor Abdullah, Abdul Hanan QA75 Electronic computers. Computer science Mobile agent interaction is usually vulnerable to attacks from within and outside the agent’s execution environment. Also, the mobility property of mobile agents earns them the opportunity to migrate from one security domain to another. Intranet/LAN with connection to internet do, from time to time, experience agent visitation either for malicious purpose or for legitimate mission. To protect legitimate agent communication against attack by visiting agent, we propose a technique that restricts migration of the visiting agent and isolate it to a neutral host where its mission could be achieved. We refer to this technique as restriction-based access control mechanism (ResBAC). The proposed mechanism employs certificate authentication, re-defining visiting agent itinerary path and visiting agent isolation to accomplish the aforementioned objective. The performance of the proposed mechanism is evaluated using scenarios to determine the strength of the mechanism in term of its ability to protect agent communication against the three major threats: man-in-the-middle attack, replay attack, and passive eavesdropping. Penerbit UTM Press 2015-11 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/56008/1/ShukorAbdulRazak2015_InterConfidentialityProtectionofAgentCommunication.pdf Ogunnusi, Olumide Simeon and Abd. Razak, Shukor and Abdullah, Abdul Hanan (2015) Inter-confidentiality protection of agent communication in multi-agent system based applications. Jurnal Teknologi, 77 (13). pp. 1-10. ISSN 2180-3722 http://dx.doi.org/10.11113/jt.v77.6319 DOI:10.11113/jt.v77.6319 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Ogunnusi, Olumide Simeon Abd. Razak, Shukor Abdullah, Abdul Hanan Inter-confidentiality protection of agent communication in multi-agent system based applications |
description |
Mobile agent interaction is usually vulnerable to attacks from within and outside the agent’s execution environment. Also, the mobility property of mobile agents earns them the opportunity to migrate from one security domain to another. Intranet/LAN with connection to internet do, from time to time, experience agent visitation either for malicious purpose or for legitimate mission. To protect legitimate agent communication against attack by visiting agent, we propose a technique that restricts migration of the visiting agent and isolate it to a neutral host where its mission could be achieved. We refer to this technique as restriction-based access control mechanism (ResBAC). The proposed mechanism employs certificate authentication, re-defining visiting agent itinerary path and visiting agent isolation to accomplish the aforementioned objective. The performance of the proposed mechanism is evaluated using scenarios to determine the strength of the mechanism in term of its ability to protect agent communication against the three major threats: man-in-the-middle attack, replay attack, and passive eavesdropping. |
format |
Article |
author |
Ogunnusi, Olumide Simeon Abd. Razak, Shukor Abdullah, Abdul Hanan |
author_facet |
Ogunnusi, Olumide Simeon Abd. Razak, Shukor Abdullah, Abdul Hanan |
author_sort |
Ogunnusi, Olumide Simeon |
title |
Inter-confidentiality protection of agent communication in multi-agent system based applications |
title_short |
Inter-confidentiality protection of agent communication in multi-agent system based applications |
title_full |
Inter-confidentiality protection of agent communication in multi-agent system based applications |
title_fullStr |
Inter-confidentiality protection of agent communication in multi-agent system based applications |
title_full_unstemmed |
Inter-confidentiality protection of agent communication in multi-agent system based applications |
title_sort |
inter-confidentiality protection of agent communication in multi-agent system based applications |
publisher |
Penerbit UTM Press |
publishDate |
2015 |
url |
http://eprints.utm.my/id/eprint/56008/1/ShukorAbdulRazak2015_InterConfidentialityProtectionofAgentCommunication.pdf http://eprints.utm.my/id/eprint/56008/ http://dx.doi.org/10.11113/jt.v77.6319 |
_version_ |
1643653967185444864 |