1 / 18

MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents

MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents. Presented By Mr. Muhammad Awais Shibli. Presentation Overview. Background Mobile Agents System Components Roles in the Proposed System Components of the System Operations of the System Conclusion.

red
Download Presentation

MagicNET: Security Architecture for Discovery and Adoption of Mobile Agents

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MagicNET: Security Architecture for Discovery and Adoptionof Mobile Agents Presented By Mr. Muhammad Awais Shibli

  2. Presentation Overview • Background • Mobile Agents • System Components • Roles in the Proposed System • Components of the System • Operations of the System • Conclusion

  3. Mobile Agents • Mobile agents are self-contained software modules with additional credentials and accumulated data. They roam a network, moving autonomously from one server to another, perform their designated tasks, and finally, eventually, return to their control station.

  4. Background • Wider Adoption of Mobile Agents • Security Solutions • Platform • Agent

  5. Still Problem !!!! • Secure Adoption • Experimental envirnoment • Close Envirnoment

  6. System Components • MagicNETstands for Mobile Agents Intelligent Community Network, has developed at secLab at DSV Department at KTH. • MagicNET provide complete infrastructural and functional component for secure mobile agent research and development. • It provide support to build secure & trusted mobile agents, provide agents repository (agents’ store), Mobile Agents Servers (for their runtime execution), Mobile Agent Control Station, Infrastructural servers.

  7. Roles in the Proposed System • Mobile Agent Author • Mobile Agent Registrar • Mobile Agent Manager (User)

  8. Components of the System • Services Registration Station • MagicNET Management Servers • UDDI Server • Agents Factory

  9. UDDI Server • The UDDI (Universal Description, Discovery and Integration) Server provides the standard role of UDDI, as specified by OASIS. • UDDI Server --implemented using open source project JUDDI • Integrated into the WSO2 WSAS secure application server, so that Mobile Agent Registrar (publisher) can use HTTPS SSL/TLS for authentication.

  10. Apache Rampart • Apache Rampart: Apache Rampart is the security module of Apache Axix2. It implements various Web services security specifications. • Rampart eliminates security related threats at the message level. It provides protection against message alteration, confidentiality, man-in-the-middle attack, spoofing, DOS and reply attack.

  11. Operations of the System • Entities Authentication(FIPS-196) • Agent Service Registration • Agents Adoption

  12. Agent Service Registration • Mobile agent Registrar authentication with agent factory • Fetches List of agents • WSD from Agent Authors (current implementation) • Publish with UDDI Server

  13. Agents Adoption • Mobile agent Manager authentication with Agent Factory (optional, using SA) • Published agents & Select Agent • WSD obtained , auto generate client, connect to the web Server and reteive the agent. • Message level security(X509 Rampart default scenario 2)

  14. Conclusion and Future Directions • Agent Automatically publish services (Security issues.) • Discovery by other agents and adoption dynamically.

  15. Questions ???

  16. Strong Authentication • Step 1: SR send hello message to Agent Factory along with its certificate (Digital and Non Repudiation Certificate). • Step 2: Agent Factory will calculate challenge ChAF concatenate with originator and receiver ID and send to SR. • Step 3: SR then calculates challenge ChSR concatenate with ChAF , then create hash of it and sign it and finally send to Agent Factory. • Agent Factory also concatenate two challenges received calculates hash and then compare with the hash received from SR. • If both hashes are same Agent Factory, concatenate both challenges then calculate hash and sign it, attach its certificate (digital and non-repudiation) and send to SR. • SR then send keyEnchipherment certificate to Agent Factory and then Agent Factory send its keyEnchipherment certificate to SA.

More Related