A LIGHTWEIGHT ONE-PASS AUTHENTICATION MECHANISM FOR AGENT COMMUNICATION IN MULTI-AGENT SYSTEM BASED APPLICATIONS
DOI:
https://doi.org/10.11113/jt.v77.6470Keywords:
One-pass authentication, two-pass authentication, agent communication, confidentiality protectionAbstract
The social nature of mobile agent and its ability to carry its principal’s confidential information necessitate the need to secure its communication with other agent(s) in an agent system. Most importantly, an agent communication security mechanism must be able to prevent unknown or visiting agent from participating in legitimate agent communication. Most of such mechanisms adopt two-pass authentication technique without due consideration of the enormous overheads generated by the mechanisms. These overheads are more noticeable in multi-agent system based applications with large number of agents such as smart grid. The main focus of this paper therefore, is to design a lightweight mechanism for agent communication confidentiality protection in a local area network (LAN) or intranet using one-pass authentication approach. The proposed mechanism adopted both symmetric and asymmetric cryptosystems to protect agent certificate transmission between task agents and agent execution host. The results show that the memory utilization, communication and computation costs of the proposed mechanism are remarkably lower than that of the two-pass authentication based mechanisms.
References
Braubach, L., K. Jander, and A. Pokahr. 2013. A Practical Security Infrastructure for Distributed Agent Applications, in Multiagent System Technologies. Springer. 29-43.
Stallings, W. 2007. Network Security Essentials: Applications and Standards. Pearson Education India.
Rossebo, J. E. and R. Bræk. 2006. Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition. In Availability, Reliability and Security, ARES 2006. The First International Conference on. IEEE.
Xu, J., W.-T. Zhu, and D.-G. Feng. 2011. An efficient Mutual Authentication and Key Agreement Protocol Preserving User Anonymity in Mobile Networks. Computer Communications. 34(3): 319-325.
Guo, C., C.-C. Chang, and C.-Y. Sun. 2013. Chaotic Maps-Based Mutual Authentication and Key Agreement Using Smart Cards for Wireless Communications. Journal of Information Hiding and Multimedia Signal Processing. 4(2): 99-109.
Ben Ameur, S., et al. 2014. A Lightweight Mutual Authentication Mechanism for Improving Fast PMIPV6-Based Network Mobility Scheme. In Network Infrastructure and Digital Content (IC-NIDC), 2014 4th IEEE International Conference on. IEEE.
Vila, X., A. Schuster, and A. Riera. 2007. Security for a Multi-Agent System based on JADE. Computers & Security. 26(5): 391-400.
Sulaiman, R. and D. Sharma. 2011. Enhancing Security in E-Health Services Using Agent. In Electrical Engineering and Informatics (ICEEI), 2011 International Conference on. IEEE.
Sulaiman, R., X. Huang, and D. Sharma. 2009. E-Health Services with Secure Mobile Agent. In Communication Networks and Services Research Conference, 2009. CNSR'09. Seventh Annual. IEEE.
Ismail, L. and E. Barka. 2008. Key Distribution Framework for a Mobile Agent Platform. In Next Generation Mobile Applications, Services and Technologies, 2008. NGMAST'08. The Second International Conference on. IEEE.
Srivastava, S. and G. Nandi. 2014. Self-Reliant Mobile Code: A New Direction of Agent Security. Journal of Network and Computer Applications. 37: 62-75.
Board, J. 2005. Jade Security Guide. JADE-S Version, 2.
Bellifemine, F. et al. 2002. Jade Programmer’s Guide. Jade version, 3.
Downloads
Published
Issue
Section
License
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.