Abstract
Securing data and applications is critical in the wireless era. The successive increase in wireless communication opens vulnerabilities to confidential information. This paper aims at investigating the issues related to security when the Java 2 Micro Edition (J2ME) based multi-agent system applications are run on different handheld devices. Agent’s information must be protected on the local device as well as on other devices during communication. J2ME MIDP security model does not provide secure data storage and communication mechanism for applications running on different mobile devices. This paper proposes a mechanism for secure storage of agent’s information and also securing communication between agents in J2ME based lightweight multi-agent system. We present a new solution to this problem by providing a security framework that can be used to provide agent’s secure storage and communication on the application layer by using the existing cryptographic techniques. Storing the encrypted data on local device helps securing the agent’s information. In this approach for secure agent’s messaging the encrypted data is communicated with the help of session keys exchange, so no need to encrypt the data at runtime for communication as only the keys are encrypted. This results in the better security level and minimal performance overhead. The solution has been evaluated on the SAGE-Lite (lightweight multi-agent system) in order to cope with the security drawbacks related to agent’s secure storage and communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Sun’s Java 2 Micro Edition Platform, http://java.sun.com/javame/index.jsp
Itani, W., et al.: J2ME End to End Security for M-Commerce, University of Beirut. Published in WCNC, IEEE (2003)
Klingsheim, A.N., et al.: Challenges in Securing Networked J2ME Applications, Published by the IEEE Computer Society Computing Practices (2007)
Farooq, H., et.,, al,: Persistent Architecture for Context Aware Lightweight Multi Agent System. In: The Fifth International Joint Conference on Autonomous Agents & Multi-Agent Systems (AAMAS 2006), Hakodate, Japan, May 8-12 (2006)
MIDP Security: Design Concerns & Cryptography, http://developers.sun.com/techtopics/mobility/midp/articles/security1/index.html
Mobile Information Device Profile (MIDP 2.0) security framework. http://developers.sun.com/techtopics/mobility/midp/articles/midp20/
Harbitter, A., et al.: The performance of Public key-enabled Kerberos authentication in mobile computing. In: Proceedings of the 8th ACM conference on Computer and Communications Security, 2001.Conference on Communications and mobile computing, pp. 1295–1300 (2001)
Barka, E.S., et al.: End-to-End security solutions for WLAN: A performance analysis for the underlying encryption algorithms in the lightweight devices. In: International Conference on Communications and Mobile Computing (2006)
Bouncy Castle Cryptography APIs, http://www.bouncycastle.org
Daemen, J., et al.: Rijndael, the Advanced Encryption Standard. Published in Journal of Network and Computer Applications (March 2001)
Ali, A., et al: Scalable fault tolerant Agent Grooming Environment – SAGE, NUST Institute of Information Technology (NIIT) National University of Sciences and Technology (NUST) Rawalpindi, Pakistan
Foundation for Intelligent Physical Agents, http://www.fipa.org
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shah, S.M.A., Gul, N., Ahmad, H.F., Bahsoon, R. (2008). Secure Storage and Communication in J2ME Based Lightweight Multi-Agent Systems. In: Nguyen, N.T., Jo, G.S., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2008. Lecture Notes in Computer Science(), vol 4953. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78582-8_90
Download citation
DOI: https://doi.org/10.1007/978-3-540-78582-8_90
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78581-1
Online ISBN: 978-3-540-78582-8
eBook Packages: Computer ScienceComputer Science (R0)