API-S CALCULUS: FORMAL MODELING for SECURE MOBILE INTELLIGENT AGENT SYSTEMS Jean Francois Gourd University of Southern Mississippi
Total Page:16
File Type:pdf, Size:1020Kb
The University of Southern Mississippi The Aquila Digital Community Dissertations Summer 8-2007 API-S CALCULUS: FORMAL MODELING FOR SECURE MOBILE INTELLIGENT AGENT SYSTEMS Jean Francois Gourd University of Southern Mississippi Follow this and additional works at: https://aquila.usm.edu/dissertations Part of the Applied Mathematics Commons, and the Computer Sciences Commons Recommended Citation Gourd, Jean Francois, "API-S CALCULUS: FORMAL MODELING FOR SECURE MOBILE INTELLIGENT AGENT SYSTEMS" (2007). Dissertations. 1264. https://aquila.usm.edu/dissertations/1264 This Dissertation is brought to you for free and open access by The Aquila Digital Community. It has been accepted for inclusion in Dissertations by an authorized administrator of The Aquila Digital Community. For more information, please contact [email protected]. The University of Southern Mississippi API-S CALCULUS: FORMAL MODELING FOR SECURE MOBILE INTELLIGENT AGENT SYSTEMS by Jean Gourd A Dissertation Submitted to the Graduate Studies Office of The University of Southern Mississippi in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Approved: August 2007 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Copyright by J e a n G o u r d 2007 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. The University of Southern Mississippi API-S CALCULUS: FORMAL MODELING FOR SECURE MOBILE INTELLIGENT AGENT SYSTEMS by Jean Gourd Abstract of a Dissertation Submitted to the Graduate Studies Office of The University of Southern Mississippi in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2007 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. ABSTRACT API S CALCULUS: FORMAL MODELING FOR SECURE MOBILE INTELLIGENT AGENT SYSTEMS by Jean Gourd August 2007 Mobile code has, for some time, been an intriguing area of research. Unfortunately, it has not propagated much to real-world applications primarily due to serious security con cerns associated with processes that possess the capability to move across administrative domains (e.g. mobile intelligent agents). In order to ensure the future success and safety of mobile code, it is imperative that comprehensive mechanisms be developed that permit thorough modeling and analysis of such systems. The use of formal methods to give software meaningful function and performance guarantees is becoming more widespread as the staggering cost of software bugs increases. Using formal methods provides opportunities to experiment with complex systems in order to ultimately prove their functionality, thus offering some sort of validity guarantee. API Calculus stands out in a sea of similar modeling tools as particularly adept at modeling mobile agents and multi-agent systems (MAS). We propose to extend the API Calculus to include the capability to model the security of mobile agents (and agent hosts). We introduce the API-S Calculus as an extension to the API Calculus. In this calcu lus, we introduce several new and unique constructs that provide mechanisms to formally model cryptographic protocols and various security techniques unique to the mobile intel ligent agent paradigm. We introduce Q-terms and ^-processes which allow the detailed analysis of various cryptographic protocols. Moreover, we provide a way to more accu rately model realistic distributed computational systems by introducing the milieu listener, a form of agent broadcast. We extend the concepts of milieu, knowledge unit, and term as defined in the API Calculus in order to impart our calculus with the added flexibility to provide the mechanisms necessary to model and analyze the security of interacting mobile ii Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. iii agents, particularly with respect to MAS. Furthermore, these extensions will support ac curate modeling of the security of mobile intelligent agents while distinguishing between groups of cooperating agents, thus providing the tools necessary to model a common secu rity model for a group of mobile agents working together to perform some computational task. The need to formally model a MAS initially motivated the development of the API-S Calculus. This multi-agent fuzzy logic framework-termed DDI (Defense Data Integration)- ultimately provides a fused input to an external inclusive decision support system. The framework utilizes mobile intelligent agents to collect, sort, filter, and fuse heterogeneous data for inclusion in the fuzzy logic engine. The unique security requirements of DDI provided the primary motivation for the design of the API-S Calculus. The lack of a for mal modeling tool that can capably model MAS and the intrinsic security characteristics of such systems furthermore motivated the development of the API-S Calculus. We ul timately show how the calculus can be used to accurately model the DDI framework as well as numerous cryptographic protocols and security techniques relevant to the mobile intelligent agent paradigm. Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. T o M y D a z z l in g W if e iv Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. ACKNOWLEDGMENTS I wish to thank several people who have provided me an innumerable amount of as sistance in my endeavor to push through this phase of my life. First, I wish to thank Dr. Dia Ali for his incredible support. Truly, he has helped me in countless ways and I am indebted; Dr. Adel Ali whose keen racquetball skills ultimately led to a graduate educa tion; my doctoral committee whose talented members endlessly provided guidance in this exciting process; the 251 crew (you know who you are) whose members have provided me with a wonderful, challenging, and perpetually amusing work environment. Finally, I wish to thank my marvelous wife who, with her unending love and support, is the singular reason I have been able to achieve this. v Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. TABLE OF CONTENTS ABSTRACT............................................................................................................. ii DEDICATION...............................................................................................................iv ACKNOWLEDGEMENTS...........................................................................................v LIST OF ILLUSTRATIONS............................................................................... viii LIST OF T A B L E S................................................................................................ ix 1 INTRODUCTION............................................................................................ 1 1.1 Mobility and the Future 1 1.2 Intelligent Agents 3 1.3 Mobile Agents 4 1.4 Security Issues 6 1.5 Modeling 7 1.6 Motivation 9 1.7 Overview of the Thesis 11 1.8 Contributions of the Thesis 12 1.9 Thesis Structure 14 2 MOBILE AGENT SECURITY.................... 15 2.1 General Security Assumptions 15 2.2 Unique Mobile Agent Characteristics 17 2.3 Multi Agent Systems 18 2.4 Security Issues 19 2.5 Protecting the Host 21 2.6 Protecting the Agent 24 2.7 Summary 30 3 MOBILE AGENT MODELING TO OLS ............................................................ 31 3.1 Petri Nets 31 3.2 7t-Calculus 37 3.3 Ambient Calculus 43 3.4 SPI Calculus 50 3.5 API Calculus 54 3.6 Other Modeling Methods 60 3.7 Summary 60 vi Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. 4 THE API-S CALCULUS ..................................................................................... 63 4.1 Syntax 64 4.2 Broadcasting 74 4.3 Abbreviations 76 4.4 Structural Congruence 78 4.5 Reduction 80 4.6 Discussion 84 5 ILLUSTRATIONS OF THE CAPABILITIES OF A P I-S..................................86 5.1 Simple Examples 86 5.2 Examples with Knowledge Units 88 5.3 Examples with Milieus 90 5.4 Other Examples 94 5.5 Examples Exhibiting Characteristics of Security 97 5.6 Discussion 104 6 THE PRELIMINARY FORMAL MODEL FOR D D I................................... 106 6.1 Preliminary Definition of Formal Components 106 6.2 Preliminary Formal Model 109 7 CONCLUSIONS AND FUTURE W O R K ....................................................... 115 7.1 Conclusive Remarks 115 7.2 Future Directions 116 7.3 Discussion 120 BIBLIOGRAPHY................................................................................................ 122 vii Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. LIST OF ILLUSTRATIONS Figure 1.1 Multi-Agent Fuzzy Logic Framework ................................................................ 10 3.1 Graph representation of a Petri n e t ...................................................................... 32 3.2 A marked Petri n e t ............................................................................................... 32 3.3 The Petri net resulting from the firing of transition t\ ....................................... 33 3.4 The Petri net resulting from the firing of transition ?3 ....................................... 33 3.5 The Petri net modeling a simple producer-consumer scenario .......................... 35 3.6 The Petri net modeling the equation x = (a