CFP last date
20 December 2024
Reseach Article

An Efficient Approach for Mobile Agent Security

by Pankaj Mehta, Divya Bisht, Nripesh Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 6
Year of Publication: 2014
Authors: Pankaj Mehta, Divya Bisht, Nripesh Kumar
10.5120/18756-0015

Pankaj Mehta, Divya Bisht, Nripesh Kumar . An Efficient Approach for Mobile Agent Security. International Journal of Computer Applications. 107, 6 ( December 2014), 21-25. DOI=10.5120/18756-0015

@article{ 10.5120/18756-0015,
author = { Pankaj Mehta, Divya Bisht, Nripesh Kumar },
title = { An Efficient Approach for Mobile Agent Security },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 6 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number6/18756-0015/ },
doi = { 10.5120/18756-0015 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:40:22.056511+05:30
%A Pankaj Mehta
%A Divya Bisht
%A Nripesh Kumar
%T An Efficient Approach for Mobile Agent Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 6
%P 21-25
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile agent technology provide a computing infrastructure in which a program in the form of a software agent can run at any host, suspend its execution, transfer itself to another host and resume execution at the new host. As the agent migrated between multiple hosts that are trusted to different degrees causes new security threats from malicious agents and hosts. Mobile applications must balance security requirements with the help of available security mechanism in order to meet application level security goals. In this paper a new security mechanism is proposed to protect the agent from attacks. In this proposed mechanism the mobile code will be encrypted using Triple DES before it starts traversing in the network so that only authenticated hosts can read the current data and state of the mobile agent.

References
  1. E. C. Vijil and Kanwal Rekhi, "Security Issues in Mobile Agents", School of Information Technology, Indian Institute of Technology, Bombay, Mumbai, 400 076.
  2. J. Todd McDonald and Alec Yasinsac, "Security Models for Mobile Agent Systems", www. elsevier. com/locate/entcs
  3. William M. Farmer, Joshua D. Guttman, and Vipin Swarup, "Security for Mobile Agents: Issues and Requirements", The MITRE Corporation 202 Burlington Road Bedford, MA 01730 1420.
  4. David Kotz, Robert Gray, and Daniela Rus, "Future Directions for Mobile-Agent Research", Technical Report TR2002-415, Department of Computer Science, Dartmouth College, January 29, 2002
  5. What is agent? -A world class definition from the webopedia computer dictionary, http://www. webopedia. com/TERM/A/agent. html
  6. Yang Kun, Guo Xin and Liu Dayou, "Security in Mobile Agent System: Problems and Approaches", Department of Computer Science, JiLin University, Changchun, 130023.
  7. V. A. Pham and A. Karmouch, "Mobile software agents: an overview", IEEE Communications Magazine, Vol. 36, No. 7, 1998.
  8. Niklas Borselius, "Mobile agent security", Mobile VCE Research Group Information Security Group, Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK
  9. Rajan Sahota, "An Overview of Security Techniques to Protect Mobile Agent from Malicious Host", International Conference on Computing and Control Engineering, 12 & 13 April, 2012.
  10. Michael S. Greenberg, Jennifer C. Byington, Theophany Holding and David G. Harper, "Mobile Agents and Security", Tufts University.
  11. George C. Necula, and Peter Lee. "Safe, untrusted agents using proof-carrying code". In G. Vigna, editor, Mobile Agents and Security, volume 1419 LNCS, pages 61–91. Springer-Verlag, Berlin, 1998.
  12. Wayne A. Jansen, "Countermeasures for Mobile Agent Security", National Institute of Standards and Technology, Gaithersburg, MD 20899, USA.
  13. James Riordan and Bruce Schneier, "Environmental key generation towards clueless agents". G. Vigna, editor, Mobile Agents and Security, volume 1419 in LNCS, pages 15–24. Springer-Verlag, Berlin, 1998.
  14. Uwe G. Wilhelm, Sebastian Staamann, and Levente Buttya, "Introducing Trusted Third Parties to the Mobile Agent Paradigm", J. Vitek and C. Jensen, editors, Secure Internet Programming, volume 1603 in LNCS, pages 471–491, New York, NY, USA, 1999. Springer-Verlag Inc.
  15. G. Vigna, "Protecting Mobile Agents Through Tracing", Proceedings of the 3rd ECOOP Workshop on Mobile Object Systems, Jyvälskylä, Finland, June 1997. http://www. cs. ucsb. edu/~vigna/listpub. html
  16. Yashpal Singh , Kapil Gulati and S Niranjan, "Dimensions and issues of Mobile Agent Technology", International Journal of Artificial Intelligence & Applications (IJAIA), Vol. 3, No. 5, September 2012.
  17. Wayne Jansen and Tom Karygiannis, "Mobile Agent Security", NIST Special Publication 800-19 –, National Institute of Standards and Technology.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Agent security issues security requirements protecting agent platform protecting agent Triple DES