Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

An Efficient Approach for Mobile Agent Security

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 107 - Number 6
Year of Publication: 2014
Authors:
Pankaj Mehta
Divya Bisht
Nripesh Kumar
10.5120/18756-0015

Pankaj Mehta, Divya Bisht and Nripesh Kumar. Article: An Efficient Approach for Mobile Agent Security. International Journal of Computer Applications 107(6):21-25, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Pankaj Mehta and Divya Bisht and Nripesh Kumar},
	title = {Article: An Efficient Approach for Mobile Agent Security},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {107},
	number = {6},
	pages = {21-25},
	month = {December},
	note = {Full text available}
}

Abstract

Mobile agent technology provide a computing infrastructure in which a program in the form of a software agent can run at any host, suspend its execution, transfer itself to another host and resume execution at the new host. As the agent migrated between multiple hosts that are trusted to different degrees causes new security threats from malicious agents and hosts. Mobile applications must balance security requirements with the help of available security mechanism in order to meet application level security goals. In this paper a new security mechanism is proposed to protect the agent from attacks. In this proposed mechanism the mobile code will be encrypted using Triple DES before it starts traversing in the network so that only authenticated hosts can read the current data and state of the mobile agent.

References

  • E. C. Vijil and Kanwal Rekhi, "Security Issues in Mobile Agents", School of Information Technology, Indian Institute of Technology, Bombay, Mumbai, 400 076.
  • J. Todd McDonald and Alec Yasinsac, "Security Models for Mobile Agent Systems", www. elsevier. com/locate/entcs
  • William M. Farmer, Joshua D. Guttman, and Vipin Swarup, "Security for Mobile Agents: Issues and Requirements", The MITRE Corporation 202 Burlington Road Bedford, MA 01730 1420.
  • David Kotz, Robert Gray, and Daniela Rus, "Future Directions for Mobile-Agent Research", Technical Report TR2002-415, Department of Computer Science, Dartmouth College, January 29, 2002
  • What is agent? -A world class definition from the webopedia computer dictionary, http://www. webopedia. com/TERM/A/agent. html
  • Yang Kun, Guo Xin and Liu Dayou, "Security in Mobile Agent System: Problems and Approaches", Department of Computer Science, JiLin University, Changchun, 130023.
  • V. A. Pham and A. Karmouch, "Mobile software agents: an overview", IEEE Communications Magazine, Vol. 36, No. 7, 1998.
  • Niklas Borselius, "Mobile agent security", Mobile VCE Research Group Information Security Group, Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK
  • Rajan Sahota, "An Overview of Security Techniques to Protect Mobile Agent from Malicious Host", International Conference on Computing and Control Engineering, 12 & 13 April, 2012.
  • Michael S. Greenberg, Jennifer C. Byington, Theophany Holding and David G. Harper, "Mobile Agents and Security", Tufts University.
  • George C. Necula, and Peter Lee. "Safe, untrusted agents using proof-carrying code". In G. Vigna, editor, Mobile Agents and Security, volume 1419 LNCS, pages 61–91. Springer-Verlag, Berlin, 1998.
  • Wayne A. Jansen, "Countermeasures for Mobile Agent Security", National Institute of Standards and Technology, Gaithersburg, MD 20899, USA.
  • James Riordan and Bruce Schneier, "Environmental key generation towards clueless agents". G. Vigna, editor, Mobile Agents and Security, volume 1419 in LNCS, pages 15–24. Springer-Verlag, Berlin, 1998.
  • Uwe G. Wilhelm, Sebastian Staamann, and Levente Buttya, "Introducing Trusted Third Parties to the Mobile Agent Paradigm", J. Vitek and C. Jensen, editors, Secure Internet Programming, volume 1603 in LNCS, pages 471–491, New York, NY, USA, 1999. Springer-Verlag Inc.
  • G. Vigna, "Protecting Mobile Agents Through Tracing", Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvälskylä, Finland, June 1997. http://www. cs. ucsb. edu/~vigna/listpub. html
  • Yashpal Singh , Kapil Gulati and S Niranjan, "Dimensions and issues of Mobile Agent Technology", International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 3, No. 5, September 2012.
  • Wayne Jansen and Tom Karygiannis, "Mobile Agent Security", NIST Special Publication 800-19 –, National Institute of Standards and Technology.