The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Design and Implementation of Inter-operable and Secure Agent Migration Protocol

Mobile agent technology is an active research topic and has found its uses in various diverse areas ranging from simple personal assistance to complex distributed big data systems. Its usage permits offline and autonomous execution as compared to classical distributed systems. The free roaming nature of agents makes it prone to several security threats during its transit state, with an added overhead in its interoperability among different types of platforms. To address these problems, both software and hardware based approaches have been proposed to ensure protection at various transit points. However, these approaches do not ensure interoperability and protection to agents during transit over a channel, simultaneously. In this regard, an agent requires a trustworthy, interoperable, and adaptive protocol for secure migration. In this paper, to answer these research issues, we first analyse security flaws in existing agent protection frameworks. Second, we implemented a novel migration architecture which is: 1) fully inter-operable compliance to the Foundation for Intelligent Physical Agents (FIPA) and 2) trustworthy based on Computing Trusted Platform Module (TPM). The proposed approach is validated by testing on software TPM of IBM, JSR321, and jTPMTools as TPM and Trusted Computing Software Stack (TSS) interfaces, JADE-agent framework and 7Mobility Service (JIPMS). Validation is also performed on systems bearing physical TPM-chips. Moreover, some packages of JIPMS are also modified by embedding our proposed approach into their functions. Our performance results show that our approach merely adds an execution overhead during the binding and unbinding phases.


[1] Aljawarneh S. and Alhaj A., “Testing and Evaluation of A Secure Integrity Measurement System (SIMS) for Remote Systems,” The 468 The International Arab Journal of Information Technology, Vol. 17, No. 4, July 2020 International Arab Journal of Information Technology, vol. 9, no. 3, pp. 235-242, 2012.

[2] Ametller J., Robles S., and Borrell J., “Agent Migration over FIPA ACL Messages,” in Proceedings of International Workshop on Mobile Agents for Telecommunication Applications, Berlin, pp. 210-219, 2003.

[3] Ametller-Esquerra J., Cucurull-Juan J., Martí R., Navarro G., and Robles S., “Enabling Mobile Agents Interoperability Through Fipa Standards,” in Proceedings of International Workshop on Cooperative Information Agents, Berlin, pp. 388- 401, 2006.

[4] Andress J., “The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice,” Syngress, 2014.

[5] Bellavista P., Corradi., A and Stefanelli C., “A Mobile Agent Infrastructure for The Mobility Support,” in Proceedings of the ACM Symposium on Applied Computing, Como, pp. 539-546, 2000.

[6] Bijani S. and Robertson D., “A Review of Attacks and Security Approaches in Open Multi-Agent Systems,” Artificial Intelligence Review, vol. 42, no. 4, pp. 607-636, 2014.

[7] Board J.A.D.E., Jade Security Guide. JADE-S Technical Report, 2005.

[8] Brahmi Z., Lini A., and Gammoudi M., “Mobile Agent Security Based on Artificial Immune System,” in Proceedings of International Joint Conference SOCO’14-CISIS’14-ICEUTE’14, Cham, pp. 385-395, 2014.

[9] Challener D., Yoder K., Catherman R.., Safford D., and Van Doorn L., A Practical Guide to Trusted Computing Pearson Education, 2007.

[10] Cucurull J., “JADE Inter-Platform Mobility Service,” Online Available and accessed from: , 2018.

[11] Cucurull J., Martí R., Navarro-Arribas G., Robles S., and Borrell J., “Full Mobile Agent Interoperability in An IEEE-FIPA Context,” Journal of Systems and Software, vol. 82, no. 12, pp. 1927-1940, 2009.

[12] Cucurull J., Martí R., Robles S., Navarro G., and Borrell J., “Agent Mobility Architecture Based on IEEE-FIPA Standards,” Computer Communications, vol. 32, no. 4, pp. 712-729, 2009.

[13] Cucurull J., Marti R., Robles S., Borrell J., and Navarro G., “FIPA-Based Interoperable Agent Mobility Proposal,” Technical Report, 2007.

[14] Cucurull J., Navarro‐Arribas G., Martí R., Robles S., and Borrell J., “An Efficient and Secure Agent Code Distribution Service,” Journal of Software: Practice and Experience, vol. 40, no. 4, pp. 363- 386, 2010.

[15] Cucurull J., Overeinder B.J., Oey M., Borrell J., and Brazier F., “Abstract Software Migration Architecture Towards Agent Middleware Interoperability,” in Proceedings of the 2nd International Multiconference on Computer Science and Information Technology, Poland, pp. 27-37, 2007.

[16] Dale J., and Lyell M., “Foundation for Intelligent Physical Agents,” http://www.fipa.org/, Last Visited, 2019.

[17] Fipa A.C.L., “FIPA acl Message Structure Specification,” http://www.fipa.org/, Last Visited, 2019.

[18] FIPA: FIPA agent management support for mobility specification, 2019.

[19] Hermanowski M. and Tews E., “Tpm4java”. Currently only available through http://web. archive.org/web/20090510093615/http://tpm4jav a. datenzone. de/trac, Last Visited, 2018.

[20] Jolly P. and Batra S., “Security AGAINST Attacks and Malicious Code Execution in Mobile Agent Using IBF-CPABE Protocol,” Wireless Personal Communications, vol. 107, no. 2, pp.1-15, 2019.

[21] Jung Y., Kim M., Masoumzadeh A., and Joshi J., “A Survey of Security Issue in Multi-Agent Systems,” Artificial Intelligence Review, vol. 37, no. 3, pp. 239-260, 2012.

[22] Kori S. and Kakkasageri M., “Intelligent Agent Based Resource Scheduling in Wireless Sensor Networks,” in Proceedings of 10th International Conference on Computing, Communication and Networking Technologies ICCCNT, Kanpur, pp. 1-7, 2019.

[23] Lei S., Liu J., and Xiao J., “A Novel Free- Roaming Mobile Agent Security Mechanism by Trusted Computing Technology,” in Proceedings of International Conference on Computer Science and Software Engineering, Hubei, pp. 721-724, 2008.

[24] Liu J., Zhang S. and Yang J., “Characterizing Web Usage Regularities with Information Foraging Agents,” IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 5, pp. 566-584, 2004.

[25] Loy S., Brown S., and Tabibzadeh K., “South Carolina Department of Revenue: Mother of Government Dysfunction,” Journal of The International Academy for Case Studies, vol. 20, no. 1, pp. 83-93, 2014.

[26] Marikkannu P., Murugesan R. and Purusothaman T., “AFDB Security Protocol Against Colluded Truncation Attack in Free Roaming Mobile Agent Environment,” in Proceedings of International Conference on Recent Trends in Information Technology, Chennai, pp. 240-244, 2011.

[27] Mishra P., “Analysis of Mitm Attack in Secure Simple Pairing,” Journal of Global Research in Computer Science, vol. 4, no. 2, pp. 42-45, 2013. Design and Implementation of Inter-operable and Secure Agent Migration Protocol 469

[28] Munoz A., Mana A., and Anton P., “A Solution Based on Cryptographic Hardware to Protect Agents,” in Proceedings of 13th International Conference on Network-Based Information Systems, Takayama, pp. 400-407, 2010.

[29] Munoz A., Mana A., and Serrano D., “Protecting Agents from Malicious Hosts Using TPM,” International Journal on Computational Science and Applications, vol. 6, no. 5, pp. 30-58, 2009.

[30] Neagu N., Dorer K., Greenwood D., and Calisti M., “LS/ATN: Reporting on A Successful Agent- Based Solution for Transport Logistics Optimization,” in IEEE Workshop on Distributed Intelligent Systems: Collective Intelligence and Its Applications, Prague, pp. 213-218, 2006.

[31] Ouardani A., Pierre S., and Boucheneb H., “A Security Protocol for Mobile Agents Based Upon The Cooperation of Sedentary Agents,” Journal of Network and Computer Applications, vol. 30 no. 3, pp. 1228-1243, 2007.

[32] Poslad S., Charlton P., and Calisti M., “Specifying Standard Security Mechanisms in Multi-Agent Systems,” in Proceedings of Workshop on Deception, Fraud and Trust in Agent Societies, Berlin, pp. 163-176, 2003.

[33] Thati P., Hao C., and Agha G., “Crawlets: Agents for High Performance Web Search Engines,” in Proceedings of International Conference on Mobile Agents, Berlin, pp. 119-134, 2001.

[34] Pulter N., Nimis J., and Lockemann P., “Managing Contingencies in Timed Transportation Networks by Agent Technology,” in Proceedings of the Workshop on Artificial Intelligence and Logistics (AILog-2010) at the 19th European Conference on Artificial Intelligence, Lisbon, 2010.

[35] Rahman S. and Bignall R., Internet Commerce and Software Agents: Cases, Technologies, and Opportunities, IGI Global, 2001.

[36] Rajeshwar B., Saravanan, A., Balaji R., Geetha, G., and Jayakumar, C., “Secure Information Retrieval Using Mobile Agent,” in Proceedings of the International Conference on Computing and Control Engineering, pp. 12-13, 2012.

[37] Rocha Á., Correia A, Wilson T., and Stroetmann K., Advances in Information Systems and Technologies, Springer Science and Business Media, 2013.

[38] Shen Z. and Tong Q., “A Security Technology for Mobile Agent System Improved by Trusted Computing Platform,” in Proceedings of 9th International Conference on Hybrid Intelligent Systems, Shenyang, pp. 46-50, 2009.

[39] Smarsly K., Law K., and Hartmann D., “Multiagent-Based Collaborative Framework for A Self-Managing Structural Health Monitoring System,” Journal of Computing in Civil Engineering, vol. 26, no. 1, pp. 76-89, 2012.

[40] Srivastava S. and Nandi G., “Self-Reliant Mobile Code: A New Direction of Agent Security,” Journal of Network and Computer Applications, vol. 37, pp. 62-75, 2014.

[41] Sun Y., Councill I., and Giles, C., “Botseer: An Automated Information System for Analyzing Web Robots,” in Proceedings of 8th International Conference on Web Engineering, Yorktown Heights, pp. 108-114, 2008.

[42] Trusted Computing Group, “TCG Specification Architecture Overview, Specification Revision, Last Visited, 2018.

[43] Upadhyay V., Balwan J., and Shankar G., “A Security Approach for Mobile Agent Based Crawler,” in Proceedings of the 2nd International Conference on Computer Science, Engineering and Applicationsm, pp. 119-123, New Delhi, 2012.

[44] Vigna G., “Mobile agents: Ten reasons for failure,” in Proceedings IEEE International Conference on Mobile Data Management, Berkeley, pp. 298-299, 2004.

[45] Vila X., Schuster A., and Riera A., “Security for A Multi-Agent System Based on JADE”. Computers and Security, vol. 26, no. 5, pp. 391- 400, 2007.

[46] Wang M., Li Q., Lin Y., Li Y., and Zhou B., “A Personalized Metasearch Engine Based on Multi-agent System,” The International Arab Journal of Information Technology, vol. 16, no. 6, pp. 978-987, 2019.

[47] Wu X., Shen Z., and Zhang H., “Secure Key Management of Mobile Agent System Using Tpm-Based Technology on Trusted Computing Platform,” in Proceedings of International Conference on Computer Science and Software Engineering, Wuhan, pp. 1020-1023, 2008.

[48] Xian H. and Feng D., “Protecting Mobile Agents' Data Using Trusted Computing Technology,” Journal of Communication and Computer, vol. 4, no. 3, pp. 44-57, 2007.

[49] Zhang W. and Yan X., “Agent Transport Security Based on Freezing Mode,” in Proceedings of International Conference on Communications and Intelligence Information Security, United States, pp. 60-63, 2010. 470 The International Arab Journal of Information Technology, Vol. 17, No. 4, July 2020 Shakir-Ullah Shah has got MSCS from Foundation University Islamabad, Pakistan with a gold medal. He is working as a assistant professor at National University of Computer & Emerging Sciences Peshawar, Pakistan. His area of interest is information security in multi-agent systems.His previous research at MS level was about authentication factors and led to explore another authentication factor i.e. “something you process”. The main objective of his current research is to secure users’ credentials and to enhance the usability of authentication and authorization. Jamil AhmadHe got PhD from King's College London, UK and MSC in Information Technology from University of Warwich, UK. His current research are in Artificial Intelligence, Artificial Neural Networks, Image processing and Machine learning. He worked as a vice chancellor of Iqra University, Islamabad, Pakistan, Abasyn University, Islamabad, Pakistan. Currently he is working as a voice chancellor of Kohat University, Pakistan. Najeeb-ur-Rehman academic abilities can be perceived from the fact that he has completed his BS (CS), and MS (CS) degrees with Cum Laude honor from FAST-National University of Computer and Emerging Sciences (NUCES) and nominated as Gold Medalist. Even more, he is nominated for Dean’s List of Honors and Rector’s List of Honors several times. He is Gold Medalist in Software and Hardware IT Competition organized by DOST-KPK and attend numerous Computer Programming and IT Contests all over the Pakistan.