Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

A Secured Layered Architecture for Mobile Agent

Published on March 2014 by Swati Aggarwal, Heman Pathak, Avdhesh Gupta
International Conference on Advances in Computer Engineering and Applications
Foundation of Computer Science USA
ICACEA - Number 3
March 2014
Authors: Swati Aggarwal, Heman Pathak, Avdhesh Gupta
b3900d7c-4de9-40bf-85c2-a3cf16864c23

Swati Aggarwal, Heman Pathak, Avdhesh Gupta . A Secured Layered Architecture for Mobile Agent. International Conference on Advances in Computer Engineering and Applications. ICACEA, 3 (March 2014), 23-28.

@article{
author = { Swati Aggarwal, Heman Pathak, Avdhesh Gupta },
title = { A Secured Layered Architecture for Mobile Agent },
journal = { International Conference on Advances in Computer Engineering and Applications },
issue_date = { March 2014 },
volume = { ICACEA },
number = { 3 },
month = { March },
year = { 2014 },
issn = 0975-8887,
pages = { 23-28 },
numpages = 6,
url = { /proceedings/icacea/number3/15628-1427/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Computer Engineering and Applications
%A Swati Aggarwal
%A Heman Pathak
%A Avdhesh Gupta
%T A Secured Layered Architecture for Mobile Agent
%J International Conference on Advances in Computer Engineering and Applications
%@ 0975-8887
%V ICACEA
%N 3
%P 23-28
%D 2014
%I International Journal of Computer Applications
Abstract

Mobile Agent (MA) technology is one of the most brilliantgrounds of scattered computing. Mobile agents are independent programs that wander the internet from machine to machine under their own control on behalf of their users to carry outexact predefined tasks. A mobile agent can postponed its execution at any point; relocate itself to another machine then start again execution at the new machine without any loss of state. This type of Mobile Agent can hold different types of data and that data should be sheltered from dissimilar types of attacks. Thus security is one of the most talented areas for the researchers functioning in the field of scattered computing. Stillplenty of research has been done in this area and a variety of solutions and approaches has been projected but still there is lots of scope to improve them or to set up new method to solve the security problem related to MA. This paper suggests a layered architecture to offer security to the hosting platform as well as to the MA. Architecture uses a variety ofconcept such as authentication, authorization, confidentiality, encapsulation, intrusion detection and trust & reputation. Here malicious hosts are identified according to their reputation and MA is allowed to be executed only on the trusted platform. Similarly, for the security of the hosts, only certified MA is authorized to be executed on host and its behaviour are observed by the platform. In this way proposed architecture not only protects its own environments but also guide other components of network to identify malicious hosts and MAs.

References
  1. Neelesh Kumar Panthi, Ilyas Khan, Vijay k. Chaudhari "Securing Mobile Agent Using Dummy and Monitoring Mobile Agents" Department of Information Technology, T. I. T. Bhopal, India.
  2. Bharti Chouksey, Ravi Mohan, Rajneesh Argawal & Dushyant Sharma,"Security Of Mobile Agents On Network For Distributed Database" published in IJREAS Volume 2, Issue 2 ( February 2012) having ISSN: 2249- 3905.
  3. Li An Qiangfeng Jiang Xiaoping Luo Zhaohui Ren Spring, 2002 "Protecting Mobile Agents against Malicious Hosts".
  4. G. Geetha , C. Jayakumar,"Trust Enhanced Data Security in Free Roaming Mobile agents Using Symmetric Key cryptography published in International Journal of Network Security & Its pplications (IJNSA), Vol. 3, No. 5, Sep 2011
  5. E. M. Maximilien, and M. P. Singh. Conceptual model of web service reputation. SIG-MOD Record 31(4):36-41, 2002.
  6. B. Khosravifar, M. Gomrokchi, J. Bentahar, P. Thiran. Maintenance-based trust for multi-agent systems. In Proceeding of 8'th International Joint Conference on Autonomous Agents and Multi-Agent Systems, pp. 1017-1024, AAMAS 2009.
  7. S. P. Marsh. Formalising trust as a computational concept. PhD thesis, University of Stirling, 1994
  8. T. Tran and R. Cohen. Improving user satisfaction in agent-based electronic marketplaces by reputationmodeling and adjustable product quality. In Proceedings of the 3'rd Interna-tional Joint Conference on Autonomous Agents and Multi-Agent Systems, pp. 828-835, AAMAS 2004.
  9. B. Yu and M. P. Singh. An evidential model of distributed reputation management. Pro-ceeding of the International Joint Conference on Autonomous Agents and Multi-Agent Systems, pp. 294-301, 2002.
  10. Babak Khosravifar,"Trust and Reputation in Multi-Agent Systems A Thesis", Department of Electrical and Computer Engineering,Concordia University April 2012
  11. Singh,A. , Juneja,D. , and Sharma,A. K. : Elliptical Curve Cryptography Based Security Engine for Multiagent Systems Operating in Semantic Cyberspace. In International Journal of Research and Review in Computer Science (IJRRCS), Vol. 2, No. 2, April 2011.
  12. P. Marikkannu, J. J. Adri Jovin, T. Purusothaman, "An Enhanced Mobile Agent Security Protocol", European Journal of Scientific Research, ISSN 1450-216X Vol. 51 No. 3 (2011), pp. 321-331, EuroJournals Publishing, Inc. 2011, http://www. eurojournals. com/ejsr. htm
  13. Aarti Singh, Parul Ahuja," Robust Algorithm for Securing an Agent Hosting Platform", International Journal of Advancements in Technology http://ijict. org/,ISSN 0976-4860
  14. Dr. Heman Pathak,"Hybrid Security Architecture (HSA) for secure execution of Mobile Agents" 2004.
  15. Wu, Y. S. , Foo, B. , Mei, Y. , Bagchi, S. : Collaborative intrusion detection system (cids): A framework for accurate and efficient ids. In: Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC'03). (2003)
  16. Faukia, N. , Hassas, S. , Fenet, S. , Albequerque, P. : Combining immune system and social insect metaphors: A paradigm for intrusion detection and response system. In: Proceedings of the 5th International Workshop for Mobile Agents for Telecommunication Applications. (2003)
  17. Li, C. , Song, Q. , Zhang, C. : Ma-ids architecture for distributed intrusion detection using mobile agents. In: Proceedings of the 2nd International Conference on Information Technology for Application (ICITA 2004).
Index Terms

Computer Science
Information Sciences

Keywords

Security trust And Reputation mobile Agent Mobile Agent System.