Presentation is loading. Please wait.

Presentation is loading. Please wait.

D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko,

Similar presentations


Presentation on theme: "D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko,"— Presentation transcript:

1 D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko, Daniela Rus Dartmouth College, Hanover, New Hampshire, USA published in 1998 Presented by Haiying Tan May, 2002 COMPSCI 725 Presentation

2 D’Agents 2 Outline  Introduction  D’Agents  Application  Security Architecture  Authentication  Example  Conclusion

3 D’Agents 3 Mobile agent --- a program which –Represents a user in a heterogeneous network –Moves autonomously from machine to machine –Functions on behalf of the user Security in mobile-agent system -Protect the machine -Protect other agents -Protect the agent -Protect a group of machines Introduction Machine B Machine A Application

4 D’Agents 4 D‘Agents A mobile-agent system (formerly named Agent Tcl) developed by Dartmouth College, its agents can be written in Tcl, Java & Scheme. It provides simple communication facilities, and effective security. It reduces migration to a single instruction. The core system has four levels. Agents Tcl…Java Server or engine TCP/IP … Email D’Agents Architecture

5 D’Agents 5 Dynamically selected proxy site http://agent.cs.dartmouth.edu/ 3. Return merged and filtered results GUI on home machine Application: Information retrieval 2. Send child agents and collect partial results Machine n Machine 1...

6 D’Agents 6 D‘Agents Security Architecture 1. Verify digital signature 2. Accept or reject agent 3. Record owner’s identity Language interpreter Enforcement module 4. Start up interpreter 5. Resume agent execution 6. Agent tries to access a resource Resource managers 8. Manager responds with grant/deny 7. Ask resource manager for permission Incoming agentAgent server

7 D’Agents 7 Authentication (I)  Task involved in protecting the machine. –Agents & messages can be encrypted to avoid interception, and digitally signed to reliably identify their owner.  Two kinds of agents distinguished. –Owned agent, owner could be authenticated and is on the server’s list of authorized user. –Anonymous agent, owner could not be authenticated or is not on the server’s list of authorized users.  PGP, Pretty Good Privacy –External encryption tool for digital signatures and encryption. –PGP uses RSA, public key cryptography for authentication, and the IDEA algorithm for encryption. –An agent chooses whether to use encryption and signatures when it migrates or sends a message.

8 D’Agents 8 Authentication (II) Fig. Encryption for the begin, jump command Home agent_begin S0S0 E0E0 Knows E1E1 Machine A S1S1 Knows agent_jump Machine B Knows If trustsKnows S2S2 E2E2 F Yes agent_jump

9 D’Agents 9 Authentication (III) Fig. Encryption for the send command Machine B Machine A S1S1 E1E1 OR S2S2 E2E2 F Yes/no Weaknesses of this authentication scheme 1.Most serious problem: Multi-hop authentication problem. 2.PGP is extremely slow. 3.Cannot generate session keys for ongoing communication. 4.No automatic distribution mechanism for the public keys.

10 D’Agents 10 Example Agent agent = new Agent (); // create the agent agent.setSignatures (true); // turn on digital signatures agent.begin ("localhost",timeout);// register with the agent system agent.jump (engineSite,timeout); //migrate to the search engine site // interact with the search engine Message queryMessage = new Message (0, query); AgentId engineAgent = new AgentId (engineSite, "search-engine"); agent.send (engineAgent, queryMessage, timeout); ReceivedMessage resultsMessage = agent.receive (timeout); …… //Return home String homeMachine = agent.getHomeId().getMachine(); agent.jump (homeMachine); Information retrieval agent implemented in java

11 D’Agents 11 Conclusion D’Agents is a simple but powerful mobile- agent system –An academic system with full source available. –Good support for migration. –It protects machines from malicious agents with straightforward security model. ? Questions –What are the advantages of D’Agents authentication scheme, if using this, which kinds of threats are under control?


Download ppt "D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko,"

Similar presentations


Ads by Google