Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Mobile Agent Systems with Multiple layers of Security

IJCA Proceedings on International Conference on Computer Technology
© 2015 by IJCA Journal
ICCT 2015 - Number 2
Year of Publication: 2015
Preeti R. Hargunani
Sulkashana A. Borsune
Aarti G. Ambekar

Preeti R Hargunani, Sulkashana A Borsune and Aarti G Ambekar. Article: Mobile Agent Systems with Multiple layers of Security. IJCA Proceedings on International Conference on Computer Technology ICCT 2015(2):17-22, September 2015. Full text available. BibTeX

	author = {Preeti R. Hargunani and Sulkashana A. Borsune and Aarti G. Ambekar},
	title = {Article: Mobile Agent Systems with Multiple layers of Security},
	journal = {IJCA Proceedings on International Conference on Computer Technology},
	year = {2015},
	volume = {ICCT 2015},
	number = {2},
	pages = {17-22},
	month = {September},
	note = {Full text available}


In today's modern era of internet and intranet where distributed networking is spreading out its effects to every nook and corner of globe, it is essential to focus on both internet and intranet facilities. Mobile agent technology can be seen as a bright emerging technology which can be equally beneficial to internet applications as well as intranet applications. It is a piece of code that can move within a given network and act and make decisions autonomously on behalf of a user/application. For real time applications mobile agents can be used as data collection agents, action triggering agents. There can be a vast number of mobile agent applications. While mobile agent applications are evolving, the point of concern remains is the Security implementations on mobile agents. This paper gives extension of work on mobile agents by working on parallel processing mobile agents and by using Java language's one of the security feature.


  • Muhammad AwaisShibli, SeadMuftic,"MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents", ISBN 978-89-5519-139-4, ICACT 2009.
  • Tarig Mohamed Ahmed, PhD, "Generate Sub-Agent Mechanism to Protect Mobile Agent Privacy", IEEE 2012.
  • Joachim Baumann, Kurt Rothermel, "The Shadow Approach: An Orphan Detection Protocol for Mobile Agents", Second International Workshop, Germany, 1998.
  • M. VigilsonPrem, S. Swamynathan, "Securing Mobile Agent and its Platform from Passive Attack of Malicious Mobile Agents", IEEE-International Conference on Advances in Engineering, Science and Management (ICAESM -2012) March 30, 31, 2012.
  • Danny B. Lange and Mitsuru Oshima, "Programming and Developing Java Mobile Agents with Aglets". (Addison Wesley publication).
  • T. Sander and C. F. Tschudin, "Protecting Mobile Agents against Malicious Hosts". G. Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS, pp. 44-60. Springer-Verlag, June 1998.
  • F. Hohl, "Time Limited Blackbox Security". G. Vigna, editor, Mobile Agents and Security, Volume 1419 of LNCS, pp. 97-102. Springer-Verlag, June 1998.
  • William M. Farmer, Joshua D. Guttman, and Vipin Swarup, "Security for Mobile Agents: Issues and Requirements", The MITRE Corporation, 202 Burlington Road, Bedford, MA 01730-1420
  • Ajay Chander, John C. Mitchell, Insik Shin "Mobile code security by java bytecode instrumentation".
  • Evens Jean, Yu Jiao, Ali R. Hurson, Thomas E. Potok, "SAS: A Secure Aglet Server", computer security conference 2007, April 11-13, 2007, USA.
  • Wayne Jansen, Tom Karygiannis "Mobile Agent Security", NIST Special Publication 800-19.
  • Kurt Rothermel, and Markus Schwehm, "Mobile Agents", Encyclopedia for Computer Science and Technology, New York: M. Dekker Inc. , 1998.
  • http://en. wikipedia. org/wiki/Mobile_agent
  • http://www. davidreilly. com/topics/software_agents/mobile_agents/
  • http://stackoverflow. com/questions/1741545/java-calculate-sha-256-hash-of-large-file-efficiently
  • http://www. flexiprovider. de/examples/ExampleDigest. html