Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

Influence of Mobile Agent Security in Distributed System

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 87 - Number 13
Year of Publication: 2014
Kayode A. Akintoye
Samson B. Akintoye

Kayode A Akintoye and Samson B Akintoye. Article: Influence of Mobile Agent Security in Distributed System. International Journal of Computer Applications 87(13):14-18, February 2014. Full text available. BibTeX

	author = {Kayode A. Akintoye and Samson B. Akintoye},
	title = {Article: Influence of Mobile Agent Security in Distributed System},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {87},
	number = {13},
	pages = {14-18},
	month = {February},
	note = {Full text available}


Due to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN. Therefore security of Distributed System (DS) is become serious challenge. One such serious challenge in DS security domain is detection of rogue points in network. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. This paper gives the new idea for detecting rouge point using Mobile agent. Mobile agent technology is best suited for audit information retrieval which is useful for the detection of rogue points. Using Mobile agent we can find the intruder in DS as well as controller can take corrective action. Mobile agents are gaining in complexity as they evolve and are now widely used in e-commerce. All phases of a business transaction, such as negotiating and signing contracts can be done using mobile agents. In this paper, a brief introduction to the recent researches & developments associated with the field of mobile agents is provided, various security threats is highlighting, and also, the weakest hot-spots of the field which need to be nurtured is touched.


  • Mohammad Zulkernine -" DIDMA: A Distributed Intrusion Detection System Using Mobile Agents" proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05)
  • G. P. Picco,"Mobile agents: an introduction",Microprocessors and Microsystems 25(2001) pp. 65-74, Dipartimento di Elettronica eInformazione, Politecnico di Milano, Milan, Italy.
  • G. Knoll, N. Suri, and J. M. Bradshaw, "Path-based Security for Mobile Agents", Electronic Notes in Theoretical Computer Science, Vol. 58, No. 2 , pp. 16, (2002).
  • D. Gavalas, G. E. Tsekouras, C. Anagnostopoulos, "A mobile agent platform for distributed network and systems management", In Journal of Systems and Software 82 (2), 355-371, 2009.
  • C. Xiaorong, L. Su, L. Mingxuan, "Research of Network ecurity Situational Assessment Quantization Based on Mobile Agent", Volume 25, 2012, Pages 1701–1707, International Conference on Solid State Devices and Materials Science, April 1-2, 2012, Macao.
  • S. M. . Moussa, G. A. Agha, "Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management", Journal of Software, Vol 5, No 6 (2010), 630-636, Jun 2010.
  • S. M. S. I. Rizvi, Z. Sultana, B. Sun, and Md. W. Islam, "Security of Mobile Agent in Ad hoc Network using Threshold Cryptography", World Academy of Science, Engineering and Technology 70- 2010.
  • A. Singh, D. Juneja, and A. K. Sharma, "Elliptical Curve Cryptography Based Security Engine for Multiagent Systems Operating in Semantic Cyberspace", In International Journal of Research and Review in Computer Science (IJRRCS), Vol. 2, No. 2, April 2011.
  • R. Shanmugalakshmi and M. Prabu, "Research Issues on Elliptic Curve Cryptography and its applications", In International Journal of Computer Science and Network Security, Vol. 9, No. 6, pp 19- 22, June 2009.
  • N. Koblitz, "Elliptic Curve Cryptosystems", Mathematics of Computation, Vol. 48, pp. 203-209, 1987.
  • V. S. Miller, "Use of Elliptic Curves in Cryptography", Advances in Cryptology- CRYPTO?85, LNCS, vol. 218, Springer-Verlag, pp. 417- 426,1986.
  • A. Singh, D. Juneja, A. K. Sharma, "Introducing Trust Establishment Protocol in Contract Net Protocol". In Proceedings of IEEE International Conference on Advances in Computer Engineering (ACE?2010), pp. 59-63, June, 2010.
  • V. Roth & M. Jalali-Sohi, " Access Control and Key Management for Mobile Agents", Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany, 8 November, 2001.
  • H. S. Nwana, "Software Agents: An Overview", Knowledge Engineering Review, 11(3):1- 40, 1996.
  • M. Woodridge and N. Jennings, "Intelligent Agents: Theory and Practice", The Knowledge Engineering Review, 10(2):114-152, June 1995.
  • S. Franklin, A. Graesser, "Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents", University of Memphis, Proceedings of the Third International Workshop on Agent Theories, Architectures, and Languages, Springer-Verlag,1996.
  • T. Finin, Y. Labrou & J. Mayfield, "KQML as an Agent Communication Language", J. Bradshaw (Eds), MIT Press, 291-316,1997.