Mobile Agent Security Based on Mutual Authentication and Elliptic Curve Cryptography
Yousra Berguig1, Jalal Laassiri2, Sanae Hanaoui3, Salah-ddine Krit3

1Yousra Berguig*, Informatics Systems and Optimization Laboratory, Ibn Tofail University, Faculty of Science, kenitra, Morocco.
2Jalal Laassiri, Informatics Systems and Optimization Laboratory, Ibn Tofail University, Faculty of Science, kenitra, Morocco.
3Sanae Hanaoui, Informatics Systems and Optimization Laboratory, Ibn Tofail University, Faculty of Science, kenitra, Morocco.
4Salah-ddine Krit, Informatics Systems and Optimization Laboratory, Polydisciplinary Faculty, Ouarzazate, Morocco. 

Manuscript received on September 19, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 2509-2517 | Volume-8 Issue-12, October 2019. | Retrieval Number: L34381081219/2019©BEIESP | DOI: 10.35940/ijitee.L3438.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Mobile agent system is a satisfying solution for the implementation and maintenance of applications distributed over large-scale networks, this solution is very used in solving complex problems since they are autonomous, Intelligent, robust and faulttolerant. Mobile agents have the capacity to migrate from one node to another all over the network allowing reduction in communication costs. Although they possess all these advantages, using them in distributed environment increases the threat to mobile agent security and during their mobility they can face different types of attacks such as of attacks like Replay attack, man-in-the-middle attack, Cookie theft attack, Offline password guessing attack, Stolen-verifier attack. In this paper we investigate the security of distributed mobile agent system. We propose a solution based on a secure Elliptic Curve Cryptography (ECC) protocol to ensure mutual authentication and protect the agent from different known attacks. The implementation of the proposed solution is obtained using Java Agent Development Framework (JADE). Also, Binary serialization is used to establish a flexible portability of the agent. Finally, we present security and performance analysis, for our solution to secure mobile agent in distributed systems.
Keywords: Binary Serialization, Elliptic Curve Cryptography (ECC), JADE, Mobile Agent, Mutual Authentication, Security.
Scope of the Article: Mobile Agents