CFP last date
20 May 2024
Reseach Article

A Multi - Faceted Approach to Mobile Agent Security

by Anthony M. Ngereki, andrew M. Kahonge
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 21
Year of Publication: 2015
Authors: Anthony M. Ngereki, andrew M. Kahonge
10.5120/21352-4118

Anthony M. Ngereki, andrew M. Kahonge . A Multi - Faceted Approach to Mobile Agent Security. International Journal of Computer Applications. 120, 21 ( June 2015), 20-26. DOI=10.5120/21352-4118

@article{ 10.5120/21352-4118,
author = { Anthony M. Ngereki, andrew M. Kahonge },
title = { A Multi - Faceted Approach to Mobile Agent Security },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 21 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number21/21352-4118/ },
doi = { 10.5120/21352-4118 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:06:49.025589+05:30
%A Anthony M. Ngereki
%A andrew M. Kahonge
%T A Multi - Faceted Approach to Mobile Agent Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 21
%P 20-26
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile agents are increasingly becoming popular in the development of current distributed applications. However, the mobility and autonomy factors of mobile agents present a host of security challenges in a distributed environment. In an attempt to ensure security of the mobile agent against a malicious host, a security framework is proposed. Our security mechanism uses a multi-faceted approach to protect mobile agents and must be incorporated from the design stage of agent systems. We identify major security threats against mobile agents by a malicious platform and propose algorithms to counter them. We then test a multi-agent system that incorporates these algorithms against one that doesn't and compare the results.

References
  1. Shzrivastava, S. & Nandi, G. C. , (2014) Fragmentation based encryption approach for self protected mobile agent. Journal of King Saud University - Computer and Information Sciences, 26, pp. 131- 142.
  2. Jansen W. A. , (1998) Mobile Agents And Security. National Institute of Standards and Technology, USA.
  3. Razouki, H. & Hair, A. , (2014). Towards A New Security Architecture of Mobile Agents. International Journal of Soft Computing and Engineering (IJSCE), Vol 3 Issue 6, 55-60.
  4. Ahmed, T. M. (2009) 'Using Secure-Image Mechanism to Protect Mobile Agent against malicious Hosts ', International Scholarly and Scientific Research & Innovation, 3(11), pp. 364-369.
  5. Mahmoodi, M. , Varnamkhasti, M. M. (2013) 'A Secure Communication in Mobile Agent System', International Journal of Engineering Trends and Technology (IJETT), 6(2), pp. 186-188.
  6. Dadhich, P. , Dutta, K. , Govil, M. C. (2010) 'Security Issues in Mobile Agents', International Journal of Computer Applications, 11(4), pp. 1-7.
  7. Ahmed, T. M. (2013) 'Protect Mobile Agent Against Malicious Host Using Partial-Mobility Mechanism', International Journal in Foundations of Computer Science & Technology (IJFCST), 3(6), pp. 41-52.
  8. D'Anna, L. , Matt, B. , Reisse, A. , Vleck, T. V. , Schwab, S. and LeBlanc, P (2003) Self-Protecting Mobile Agents Obfuscation Report , DARPA: Network Associates Laboratories.
  9. Gupta, S. (2013) 'A Secure Architecture for Mobile Agent Based Communication System ', International Journal of Latest Trends in Engineering and Technology (IJLTET), 2(2), pp. 160-164.
  10. Ismail, L. (2008) 'A Secure Mobile Agents Platform', Journal of Communications, 3(2), pp. 1-12.
  11. Madkour, M. A. , Eassa, F. E. , Ali, A. M. , & Qayyum, N. U (2014) 'Securing Mobile-Agent-Based Systems Against Malicious Hosts',World Applied Sciences Journal, 29(2), pp. 287-297.
  12. Dey, S & Sinha, D. , (2014) A Survey on Protection Techniques of Mobile Agents from Malicious Hosts. International Journal of Innovative Research in Computer and Communication Engineering, Vol 2, Issue 8.
  13. Mishra, P. K. , Singh, R. (2014) 'A Survey on Reliability Estimation Techniques for Mobile Agent based Systems ', International Journal of Advanced Computer Research, 4(14), pp. 123-133.
  14. Pai, P. , Shinde, S. K. , Khachane, A. R. (2012) 'Security in Mobile Agent Communication', International Journal of AdvancedEngineering Research and Studies, 1(4), pp. 74-80.
  15. Singh, D. , Thakur, A. , Gupta, D. (2015) 'A Review of Mobile Agent Security', International Journal of Advanced Research in Computer Science and Software Engineering, 5(2), pp. 188-190.
  16. Lee, H. , Alves-Foss, J. , and Harrison, S. (2004)'The Use Of Encrypted Functions For Mobile Agent Security'. Hawaii International Conference On System Sciences. Hawaii: DARPA. 1-10.
  17. Shrivastava, R. , Mehta, P. (2012) 'Securing Mobile Agent And Reducing Overhead Using Dummy And Monitoring Mobile Agents', International Journal of Management, IT and Engineering, 2(4), pp. 296-303.
  18. Ebietomere, E. P. & Ekuobase, G. O. , (2014) Issues on Mobile Agent Technology Adoption. African Journal of Computing & ICT, 7.
  19. Hock Kim T. &. Moreau L, (2001), Mobile Code For Key Propagation, Paper, Notes in theoretical Computer Science 63, UK,.
  20. Anand T. & Neeran K. (2000) A Security Architecture for Mobile Agents in Ajanta, Proceedings of the International Conference on Distributed Computing Systems.
Index Terms

Computer Science
Information Sciences

Keywords

Agent Security Authentication Authorization Monitoring Supervision Secure Sockets Layer (SSL) Transport Layer Security (TLS) Agent Communication.