CFP last date
20 May 2024
Reseach Article

Influence of Mobile Agent Security in Distributed System

by Kayode A. Akintoye, Samson B. Akintoye
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 13
Year of Publication: 2014
Authors: Kayode A. Akintoye, Samson B. Akintoye

Kayode A. Akintoye, Samson B. Akintoye . Influence of Mobile Agent Security in Distributed System. International Journal of Computer Applications. 87, 13 ( February 2014), 14-18. DOI=10.5120/15267-9760

@article{ 10.5120/15267-9760,
author = { Kayode A. Akintoye, Samson B. Akintoye },
title = { Influence of Mobile Agent Security in Distributed System },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 13 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { },
doi = { 10.5120/15267-9760 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:05:48.706584+05:30
%A Kayode A. Akintoye
%A Samson B. Akintoye
%T Influence of Mobile Agent Security in Distributed System
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 13
%P 14-18
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

Due to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So to protect the networks from attackers and the Intrusion detection technology becomes popular. There is tremendous rise in attacks on wired and wireless LAN. Therefore security of Distributed System (DS) is become serious challenge. One such serious challenge in DS security domain is detection of rogue points in network. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. This paper gives the new idea for detecting rouge point using Mobile agent. Mobile agent technology is best suited for audit information retrieval which is useful for the detection of rogue points. Using Mobile agent we can find the intruder in DS as well as controller can take corrective action. Mobile agents are gaining in complexity as they evolve and are now widely used in e-commerce. All phases of a business transaction, such as negotiating and signing contracts can be done using mobile agents. In this paper, a brief introduction to the recent researches & developments associated with the field of mobile agents is provided, various security threats is highlighting, and also, the weakest hot-spots of the field which need to be nurtured is touched.

  1. Mohammad Zulkernine -" DIDMA: A Distributed Intrusion Detection System Using Mobile Agents" proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05)
  2. G. P. Picco,"Mobile agents: an introduction",Microprocessors and Microsystems 25(2001) pp. 65-74, Dipartimento di Elettronica eInformazione, Politecnico di Milano, Milan, Italy.
  3. G. Knoll, N. Suri, and J. M. Bradshaw, "Path-based Security for Mobile Agents", Electronic Notes in Theoretical Computer Science, Vol. 58, No. 2 , pp. 16, (2002).
  4. D. Gavalas, G. E. Tsekouras, C. Anagnostopoulos, "A mobile agent platform for distributed network and systems management", In Journal of Systems and Software 82 (2), 355-371, 2009.
  5. C. Xiaorong, L. Su, L. Mingxuan, "Research of Network ecurity Situational Assessment Quantization Based on Mobile Agent", Volume 25, 2012, Pages 1701–1707, International Conference on Solid State Devices and Materials Science, April 1-2, 2012, Macao.
  6. S. M. . Moussa, G. A. Agha, "Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management", Journal of Software, Vol 5, No 6 (2010), 630-636, Jun 2010.
  7. S. M. S. I. Rizvi, Z. Sultana, B. Sun, and Md. W. Islam, "Security of Mobile Agent in Ad hoc Network using Threshold Cryptography", World Academy of Science, Engineering and Technology 70- 2010.
  8. A. Singh, D. Juneja, and A. K. Sharma, "Elliptical Curve Cryptography Based Security Engine for Multiagent Systems Operating in Semantic Cyberspace", In International Journal of Research and Review in Computer Science (IJRRCS), Vol. 2, No. 2, April 2011.
  9. R. Shanmugalakshmi and M. Prabu, "Research Issues on Elliptic Curve Cryptography and its applications", In International Journal of Computer Science and Network Security, Vol. 9, No. 6, pp 19- 22, June 2009.
  10. N. Koblitz, "Elliptic Curve Cryptosystems", Mathematics of Computation, Vol. 48, pp. 203-209, 1987.
  11. V. S. Miller, "Use of Elliptic Curves in Cryptography", Advances in Cryptology- CRYPTO?85, LNCS, vol. 218, Springer-Verlag, pp. 417- 426,1986.
  12. A. Singh, D. Juneja, A. K. Sharma, "Introducing Trust Establishment Protocol in Contract Net Protocol". In Proceedings of IEEE International Conference on Advances in Computer Engineering (ACE?2010), pp. 59-63, June, 2010.
  13. V. Roth & M. Jalali-Sohi, " Access Control and Key Management for Mobile Agents", Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany, 8 November, 2001.
  14. H. S. Nwana, "Software Agents: An Overview", Knowledge Engineering Review, 11(3):1- 40, 1996.
  15. M. Woodridge and N. Jennings, "Intelligent Agents: Theory and Practice", The Knowledge Engineering Review, 10(2):114-152, June 1995.
  16. S. Franklin, A. Graesser, "Is it an Agent, or just a Program?: A Taxonomy for Autonomous Agents", University of Memphis, Proceedings of the Third International Workshop on Agent Theories, Architectures, and Languages, Springer-Verlag,1996.
  17. T. Finin, Y. Labrou & J. Mayfield, "KQML as an Agent Communication Language", J. Bradshaw (Eds), MIT Press, 291-316,1997.
Index Terms

Computer Science
Information Sciences


Mobile Agent Intrusion detection system Distributed System Rouge Point