Secure Mobile Agents on Ad Hoc Wireless Networks

Evan Sultanik, Donovan Artz, Gustave Anderson, Moshe Kam, William Regli, Max Peysakhov, Jonathan Sevy, Nadya Belov, Nicholas Morizio, Andrew Mroczkowski

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Scopus citations

Abstract

This paper describes SWAT, a Secure Wireless Agent Testbed. Our goal is to create an integrated environment to study information assurance for mobile agent systems on ad hoc wireless networks. The present SWAT consists of dozens of mobile hosts, both PDAs and laptops, and hundreds of both static and mobile software agents. In deploying the testbed, we have developed novel mechanisms for integrating autonomous agent technologies with public-key and symmetric key encryption to support secure communication, at multiple OSI layers, among groups of hosts and agents. The paper describes the architectural technology used in SWAT, the integration challenges, as well as applications for group collaboration, network health monitoring and system security at both the agent and the host level.

Original languageEnglish (US)
Title of host publicationProceedings of the AAAI Conference on Innovative Applications of Artificial Intelligence Conference, IAAI 2003
PublisherAAAI press
Pages129-136
Number of pages8
ISBN (Electronic)1577351886, 9781577351887
StatePublished - 2003
Externally publishedYes
Event15th AAAI Conference on Innovative Applications of Artificial Intelligence IAAI 2003 - Acapulco, Mexico
Duration: Aug 12 2003Aug 14 2003

Publication series

NameProceedings of the AAAI Conference on Innovative Applications of Artificial Intelligence Conference, IAAI 2003

Conference

Conference15th AAAI Conference on Innovative Applications of Artificial Intelligence IAAI 2003
Country/TerritoryMexico
CityAcapulco
Period8/12/038/14/03

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Science Applications
  • Computer Vision and Pattern Recognition

Fingerprint

Dive into the research topics of 'Secure Mobile Agents on Ad Hoc Wireless Networks'. Together they form a unique fingerprint.

Cite this