• Keine Ergebnisse gefunden

M The Real Challenges of Mobile Agents

N/A
N/A
Protected

Academic year: 2022

Aktie "M The Real Challenges of Mobile Agents"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

COMMUNICATIONS OF THE ACMJune 2000/Vol. 43, No. 6 111

M

obile agents provide an innovative concept for creating distributed sys- tems. Being mobile means the ability of a computational entity to move itself from one system to another in the same network.

Acting and interacting with com- patible objects in the temporary host system expresses the core idea behind mobile agents, that is, bringing the computation to the data rather than the data to the computation. The “Seven Good Reasons for Mobile Agents” [3] appear to be far- reaching: mobile agents reduce network load, overcome network latency, encapsulate protocols, work autonomously and asyn- chronously, and adapt dynami- cally. They are also robust and fault-tolerant to changing envi- ronments. Some of these bene- fits, however, are becoming less significant as the performance of hardware technology is increas- ingly improved and better able to cope with such problems as the bottleneck of bandwidth and network latency. The question is whether the technical promises of such a software concept are strong enough to provide suffi- cient momentum for building unknown application types?

Where are the real challenges and what, in fact, is the raison d’être for mobile agents?

The list of arguments in favor of mobile agents can be countered by their dark side. Clearly, more light needs to be shed. Among the top technical challenges are [1]:

• A need for highly secure agent execution environments,

• Performance and functional limitations resulting from security,

• Virus scanning and epidemic control mechanisms,

• Transmission efficiency, for example, a courier agent in contrast to a simple SMTP mail object.

This list was introduced in 1995—eons in Internet time and before the advent of Java—but all the problems still exist. These chal- lenges are conceptual, and no flaw- less technical solutions are in sight.

They require considerable techni- cal innovation, and some problems cannot be solved by technical means alone.

For example, the security prob- lem of an agent execution environ- ment has not been solved by the appearance of Java. The Java sand- box concept protects the server

unilaterally against a malicious agent by preventing the agent from accessing sensitive system software.

Conversely, there is nothing to pre- vent the server from trying to tam- per with the agent. Imagine a scenario where the mobile agent carries sensitive information deep into the Internet and some unkind soul redirects it to a spoof environ- ment. Being a finite state machine, all possible program paths of the computational entity can, in prin- ciple, be investigated by the attacker, which allows the relevant information to be accessed, even if it cannot be read. If the attacker does not find what it is looking for, it will start over and over again with a fresh memory dump of the very first time the agent entered the spoof environment. While this may be extremely resource con- suming, success will depend pri- marily on the amount of effort an attacker is willing to put in. In this case, the residual risk restricts e-commerce applications, to name only one area of potential deploy- ment.

Another security problem—

virus scanning—is also unlikely to be solved by technical means alone. Viruses and agents are both mobile code acting autonomously on behalf of a possibly untrustwor-

The Real Challenges of Mobile Agents

Detlef Schoder and Torsten Eymann

(2)

thy party, with benevolent or mali- cious intentions. It is difficult to judge which behavior prevails unless the code is analyzed or the actual activity becomes apparent and allows them to be classified into (useful) agents and (evil) viruses. With increasingly complex agents, anticipative code analysis may be impractical and classifica- tion of the application-related behavior may be difficult to inter- pret, just as in the noncomputer world where different perceptions or norms lead to different, some- times contradictory, assessments.

“With one rather narrow excep- tion, there is nothing that can be done with mobile agents that can- not also be done by other means”

[1]. This argument shifts the focus from a pure technical discussion to a more application-oriented one.

And there we find a fundamental premise, that is, there are no exclu- sive mobile agent-specific applica-

tions. As [4] points out: “We know of no other technology that, prima facie, is so seductive and promises so much, but on closer scrutiny (and, indeed, so far in practice) appears to deliver so little.” They also state “... any field which can show off literally hundreds of experimental mobile agent devel- opment systems but with no clear applications that would not exist without mobile agents, must be in some crisis.” This lack of applica- tions is closely related to the purely technical, single agent-based approach to this exciting new tech- nology. This is especially true for what is perhaps the most intrigu- ing and manifold application arena for agent technology—e- commerce. Electronic agent mar- ketplaces, such as we envision in our research project Avalanche [2], will consist of a multitude of hun- dreds, maybe even thousands, of dynamically moving and acting buyer and supplier agents. The rapid pace of the creation and dis- appearance of market opportuni- ties for agents to tap will surpass anything comparable to what we know today. We have little knowl- edge of the properties and dynam- ics that arise from having such populations of agents at work.

Apart from technical and appli- cation facets, in the distributed, decentralized, borderless world of the Internet, the absence of a social and legal framework is clearly the biggest challenge for the control- lable deployment of mobile agents.

For example, due to the sheer num- ber of entities involved and the technical constraints of the under- lying communications networks, apparent problems like system sta- bility and communication security can scarcely be solved by providing centralized control mechanisms.

Technical aspects of security inter-

twine with application contexts and our conception of societal systems together with shared rules of social and business conduct. This infor- mation ecosystem view reveals even more challenges. How should we design appropriate social and legal frameworks for populations of interacting, autonomous, and mobile agents in order to achieve desirable, self-stabilizing, and yet flexible, behavior?

In our view, the technical aspects of mobile agents are not the only aspects requiring close attention. The real challenges lie in complementary concepts for the (self-)control of populations of mobile agents, such as multiagent systems, able to provide solutions for application areas characterized by inherently decentralized infor- mation. Coping with all of these challenges will provide the raison d’être and fulfill the promise of mobile agent technology.

References

1. Chess, D. M., Harrison, C. G., and Kershen- baum, A. Mobile agents: Are they a good idea?

Research Report, IBM Research Division, T.J. Watson Research Center, Yorktown Heights, NY. Mar., 1995; www.research.

ibm.com/iagents/publications.html 2. Eymann, T., Padovan, B., and Schoder, D.

Simulating value chain coordination with arti- ficial life agents. In Proceedings of the 3rd Intl.

Conference on Multi-Agent Systems (ICMAS’98).

IEEE CS Press, Los Alamitos, CA, 423–424.

3. Lange, B. L., and Oshima, M. Seven good reasons for mobile agents. Commun. ACM 43, 3 (Mar.1999), 88–99.

4. Nwana, H. S. and Ndumu, D. T. A perspec- tive on software agents research. Knowledge Engin. Rev. 14, 2 (June 1999), 125–142.

Detlef Schoder

(schoder@icsi.berkeley.edu) is Visiting Scholar at University of California, Berkeley, and an assistant professor at University of Freiburg, Germany.

Torsten Eymann (eymann@iig.

uni-freiburg,de) is a research assistant at University of Freiburg, Germany.

© 2000 ACM 0002-0782/00/0600 $5.00

c

112 June 2000/Vol. 43, No. 6COMMUNICATIONS OF THE ACM

Referenzen

ÄHNLICHE DOKUMENTE

Olorofim shows great promise for the treatment of resistant mold infections. It possesses activity against highly resistant and cryptic Aspergillus species including A. In

additifs pour l’ensilage: substances, y compris les enzymes ou les microorganismes, destinées à être incorporées dans les aliments pour animaux afin d’améliorer la

They are the pro- cess for Pastry KBR routing service, a process for periodically sending heart-beat messages to children nodes of a streaming group which is used for detecting

Therefore, this research aims at providing a model for designing Adaptive Mobile User Interfaces (AMUIs) and a prototype as a proof of concept to improve the usability of mobile

Gegenanzeigen: Alle: Überempfindlichkeit gegen den Wirkstoff oder sonstige Bestandteile des Arzneimittels; Überempfindlich- keitsreaktionen in der Anamnese (z.B.

Different developed methods for determination of warfare agents allow the examination of water samples but also of complex matrices such as food, biological and environmental

Wenn ein Kunde Dir (oder Deiner Firma) zum ersten Mal eine E-Mail schickt, erstellt Zammad ein neues Ticket. Jede Nachricht zwischen Dir und dem Kunden wird in diesem

Part IV Applicative Issues 14 Middleware Support for Context-Aware