DocumentCode :
1010566
Title :
Formal Modeling and Analysis of a Secure Mobile-Agent System
Author :
Ma, Lu ; Tsai, Jeffrey J P
Author_Institution :
Teradata Corp., El Segundo
Volume :
38
Issue :
1
fYear :
2008
Firstpage :
180
Lastpage :
196
Abstract :
As a recently emerging distributed computing paradigm, mobile-agent technology attracts great interests because of its salient merits. However, it also brings significant security concerns, among which the security problems between a mobile agent and its platforms are of primary importance. While protecting a platform (platform or host security) can benefit from the security measures in a traditional client-server system, protecting a mobile agent (mobile-agent or code security) has not been met in traditional client-server systems and is a new area emerging with mobile-agent technology. Mobile-agent security is also believed to be the most difficult in the security areas of a mobile-agent system. Several methods are proposed to provide protection or detection mechanisms for mobile-agent security. However, many of them either lack an intuitive formal approach to formally model and analyze the system or lack security consideration for mobility - the most distinct characteristic of a mobile agent. In this paper, we extended the original elementary object system (EOS), which applies object-oriented technology to Petri nets, in several aspects because the original EOS cannot fully support the features of mobile-agent system and security modeling. Based on the extended EOS (EEOS), we developed a formal model for a generic secure mobile-agent system. This model supports not only strong mobility but also secure mobility of a mobile agent. Mutual authentication between a mobile agent and its hosting platform is accomplished in this model. Meanwhile, a security mechanism is presented for the detection of malicious platform attacks to mobile-agent code or execution flow during the mobile-agent execution. Using an intuitively graphical formal method to model, simulate, and analyze a secure mobile-agent system distinguishes this paper from other works on mobile-agent security. This paper also introduces how to translate our EEOS model to a colored Petri net (CPN) model and pres- - ents the simulation of a sample mobile-agent system model in Design/CPN. Different from the mathematical or theorem-proving analysis methods used by other mobile-agent system and mobility models, we used simulation-based analysis to verify several characteristics including boundedness, liveness, concurrence, and security of the system. Compared with other analysis methods, simulation-based analysis is generally more intuitive and more widely used in industry to solve real problems.
Keywords :
Petri nets; formal verification; mobile agents; object-oriented programming; security of data; EEOS; Petri nets; colored Petri net model; distributed computing paradigm; extended elementary object system; formal modeling; graphical formal method; malicious platform attack detection; object-oriented technology; secure mobile-agent system; simulation-based analysis; Analytical models; Area measurement; Client-server systems; Distributed computing; Earth Observing System; Mobile agents; Object oriented modeling; Petri nets; Protection; Security; Extended elementary object system (EEOS); Petri nets; formal method; mobile agent; security;
fLanguage :
English
Journal_Title :
Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on
Publisher :
ieee
ISSN :
1083-4427
Type :
jour
DOI :
10.1109/TSMCA.2007.909552
Filename :
4404055
Link To Document :
بازگشت