Inter-confidentiality protection of agent communication in multi-agent system based applications

Mobile agent interaction is usually vulnerable to attacks from within and outside the agent’s execution environment. Also, the mobility property of mobile agents earns them the opportunity to migrate from one security domain to another. Intranet/LAN with connection to internet do, from time to time,...

Full description

Saved in:
Bibliographic Details
Main Authors: Ogunnusi, Olumide Simeon, Abd. Razak, Shukor, Abdullah, Abdul Hanan
Format: Article
Language:English
Published: Penerbit UTM Press 2015
Subjects:
Online Access:http://eprints.utm.my/id/eprint/56008/1/ShukorAbdulRazak2015_InterConfidentialityProtectionofAgentCommunication.pdf
http://eprints.utm.my/id/eprint/56008/
http://dx.doi.org/10.11113/jt.v77.6319
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.56008
record_format eprints
spelling my.utm.560082017-11-01T04:16:42Z http://eprints.utm.my/id/eprint/56008/ Inter-confidentiality protection of agent communication in multi-agent system based applications Ogunnusi, Olumide Simeon Abd. Razak, Shukor Abdullah, Abdul Hanan QA75 Electronic computers. Computer science Mobile agent interaction is usually vulnerable to attacks from within and outside the agent’s execution environment. Also, the mobility property of mobile agents earns them the opportunity to migrate from one security domain to another. Intranet/LAN with connection to internet do, from time to time, experience agent visitation either for malicious purpose or for legitimate mission. To protect legitimate agent communication against attack by visiting agent, we propose a technique that restricts migration of the visiting agent and isolate it to a neutral host where its mission could be achieved. We refer to this technique as restriction-based access control mechanism (ResBAC). The proposed mechanism employs certificate authentication, re-defining visiting agent itinerary path and visiting agent isolation to accomplish the aforementioned objective. The performance of the proposed mechanism is evaluated using scenarios to determine the strength of the mechanism in term of its ability to protect agent communication against the three major threats: man-in-the-middle attack, replay attack, and passive eavesdropping. Penerbit UTM Press 2015-11 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/56008/1/ShukorAbdulRazak2015_InterConfidentialityProtectionofAgentCommunication.pdf Ogunnusi, Olumide Simeon and Abd. Razak, Shukor and Abdullah, Abdul Hanan (2015) Inter-confidentiality protection of agent communication in multi-agent system based applications. Jurnal Teknologi, 77 (13). pp. 1-10. ISSN 2180-3722 http://dx.doi.org/10.11113/jt.v77.6319 DOI:10.11113/jt.v77.6319
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ogunnusi, Olumide Simeon
Abd. Razak, Shukor
Abdullah, Abdul Hanan
Inter-confidentiality protection of agent communication in multi-agent system based applications
description Mobile agent interaction is usually vulnerable to attacks from within and outside the agent’s execution environment. Also, the mobility property of mobile agents earns them the opportunity to migrate from one security domain to another. Intranet/LAN with connection to internet do, from time to time, experience agent visitation either for malicious purpose or for legitimate mission. To protect legitimate agent communication against attack by visiting agent, we propose a technique that restricts migration of the visiting agent and isolate it to a neutral host where its mission could be achieved. We refer to this technique as restriction-based access control mechanism (ResBAC). The proposed mechanism employs certificate authentication, re-defining visiting agent itinerary path and visiting agent isolation to accomplish the aforementioned objective. The performance of the proposed mechanism is evaluated using scenarios to determine the strength of the mechanism in term of its ability to protect agent communication against the three major threats: man-in-the-middle attack, replay attack, and passive eavesdropping.
format Article
author Ogunnusi, Olumide Simeon
Abd. Razak, Shukor
Abdullah, Abdul Hanan
author_facet Ogunnusi, Olumide Simeon
Abd. Razak, Shukor
Abdullah, Abdul Hanan
author_sort Ogunnusi, Olumide Simeon
title Inter-confidentiality protection of agent communication in multi-agent system based applications
title_short Inter-confidentiality protection of agent communication in multi-agent system based applications
title_full Inter-confidentiality protection of agent communication in multi-agent system based applications
title_fullStr Inter-confidentiality protection of agent communication in multi-agent system based applications
title_full_unstemmed Inter-confidentiality protection of agent communication in multi-agent system based applications
title_sort inter-confidentiality protection of agent communication in multi-agent system based applications
publisher Penerbit UTM Press
publishDate 2015
url http://eprints.utm.my/id/eprint/56008/1/ShukorAbdulRazak2015_InterConfidentialityProtectionofAgentCommunication.pdf
http://eprints.utm.my/id/eprint/56008/
http://dx.doi.org/10.11113/jt.v77.6319
_version_ 1643653967185444864