CFP last date
20 January 2025
Reseach Article

Mobile Agent-Based Authentication: A Model for User Authentication in a Distributed System

by Dilli Prasad Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 13
Year of Publication: 2015
Authors: Dilli Prasad Sharma
10.5120/19727-1397

Dilli Prasad Sharma . Mobile Agent-Based Authentication: A Model for User Authentication in a Distributed System. International Journal of Computer Applications. 112, 13 ( February 2015), 20-25. DOI=10.5120/19727-1397

@article{ 10.5120/19727-1397,
author = { Dilli Prasad Sharma },
title = { Mobile Agent-Based Authentication: A Model for User Authentication in a Distributed System },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 13 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number13/19727-1397/ },
doi = { 10.5120/19727-1397 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:23.726887+05:30
%A Dilli Prasad Sharma
%T Mobile Agent-Based Authentication: A Model for User Authentication in a Distributed System
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 13
%P 20-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security issues in a distributed system are always crucial and existing distributed computing security technologies do not adequately address for its scalability, performance and heterogeneity. In this paper, an agent-based authentication model is designed and uses a mobile agent which is an object that migrates through many nodes of a heterogeneous network of computers, under its own control in order to perform designated tasks using local resources of the nodes. A mobile agent is called authentication mobile agent that can migrate from machine to machine in the agent-enabled network and responsible for providing the authentication service in the distributed system. The authentication mobile agent uses digital signature algorithm for the authentication of the mobile code, and password encrypted with a secret key for the user authentication. The agent maintains a small database file that also migrated with it. It may again move towards the other machines on demand. This approach provides many benefits to the development of distributed applications.

References
  1. Andrew S. Tanenbaum, Maarten van Steen "Distributed Systems: Principles and Paradigms",PHI India 2002, ISBN 81-203-2215-0
  2. Wayne Jansen, Tom Karygiannis" Mobile Agent Security" NIST Special Publication
  3. David Chess, Colin Harrison, and Aaron Kershenbaum, "Mobile Agents: Are They are Good Idea?" IBM Research Report
  4. Syed Adnan, John Datuin and Pavana Yalamanchili "A Survey of Mobile Agent Systems"
  5. Jr. and Peter Gerken and Martin Hofmann and Daria Chacón and Greg Hill and Niranjan Suri. "Mobile-Agent versus Client/Server Performance: Scalability in an Information-Retrieval Task, Dept. of Computer Science, Dartmouth College, January, 2001
  6. David Kotz and Robert S. Gray "Mobile Agents and the Future of the Internet ",Department of Computer Science / Thayer School of Engineering Dartmouth College , 1999
  7. William Stallings "Network Security Essential: Applications and Standards", Pearson Education, ISBN 81-7808-707-8
  8. Fuggetta , A, Ficco , G. P and Vigna G. "Understanding Code Mobility" IEEE Trans. Softw. Eng, Vol. 24, no. 5, pp 342-361, May 1998
  9. Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum,Maas Zeeman "Expressing security policies for distributed objects applications", Vrije Universiteit, Amsterdam, February 5, 2004.
  10. M. Van steen, P. Humburg, and A. Tanenbaum. Globe: A Wide-Area Distributed System. IEEE Concurrency, Pages 70-78, January-March 1999.
  11. Danny B. Lang and Mitsuru Oshima. Seven Good Reasons for Mobile Agents. Communication of ACM, March 1999
Index Terms

Computer Science
Information Sciences

Keywords

Distributed Systems Scalability User Authentication Digital signature Mobile Agents Mobile Code Migration Digital Signature Algorithm (DSA)