CFP last date
20 January 2025
Reseach Article

Protecting Mobile Agent using Enhanced Reference Monitor based Security Framework

by Oladeji P. Akomolafe, Attah H. Honesty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 8
Year of Publication: 2017
Authors: Oladeji P. Akomolafe, Attah H. Honesty
10.5120/ijca2017913245

Oladeji P. Akomolafe, Attah H. Honesty . Protecting Mobile Agent using Enhanced Reference Monitor based Security Framework. International Journal of Computer Applications. 161, 8 ( Mar 2017), 17-22. DOI=10.5120/ijca2017913245

@article{ 10.5120/ijca2017913245,
author = { Oladeji P. Akomolafe, Attah H. Honesty },
title = { Protecting Mobile Agent using Enhanced Reference Monitor based Security Framework },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 8 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number8/27168-2017913245/ },
doi = { 10.5120/ijca2017913245 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:52.958333+05:30
%A Oladeji P. Akomolafe
%A Attah H. Honesty
%T Protecting Mobile Agent using Enhanced Reference Monitor based Security Framework
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 8
%P 17-22
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The introduction of mobile agent technology to distributed systems presents lots of benefits which include reduced network bandwidth consumption and network latencies, load balancing, etc. One critical issue with mobile agent technology is the security of its data and code against malicious hosts. The different security mechanisms proposed to offer protection seems to suffer some shortcomings that impact the performance of mobile agent’s execution. This paper presents an efficient security framework for the protection of mobile agents. Our proposed enhanced security framework deploys a trusted third party technique designed to allow the offloading of the computation-intensive verification mechanism for execution. This approach ensures that resource consumption by the verification mechanism of the reference monitor agent on the hosts is largely reduced, thus performing more efficiently than the existing system

References
  1. K. Neeran 1998 "Security in Mobile Agent Systems, Ph. D. dissertation," Deparment of Computer Science and Engineering,, University of Minnesota.
  2. Lange, D. B. and Oshima, M. 1999 "Seven GoodReasons for Mobile Agents," Communication of the ACM, vol. 29, no. 3, pp. 88-89.
  3. H. Abdellatif 2014 "Self-adaptive security for mobile agents," International Journal of Computer Applications, pp. 50-65.
  4. R. Wang, Hu T. and Xu X. 2004 "Research in Mobile agent security," Journal of Chongqing University of Posts and Telecommunications, vol. 16, no. 3, pp. 81-86.
  5. M. P. a. M. R. Lukasz N. 2006 "Mobile agent security," 1 Thomas edition, Information assurance and computer security, IOS press, pp. 102-123.
  6. Uwe G. W., Sebastian S. and Levente B. 1, 1999 "Introducing Trusted Third Parties to the Mobile Agent Paradigm," Secure Internet Programming, vol. 1603, pp. 471-49.
  7. Sandya. A., N. M. and N. N. 2015 "Mobile Agent Security using Reference Monitor-based Security Framework," in In Proceedings of the Ninth International Conference on Emerging Security Information Systems and Technlogies.
  8. F. Hohl. 1998 "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Springer Verlag,.
  9. Esparza .O, S. M., L. Munoz J. and J. Forne 2003 "A protocol for detecting maliciouss hosts based on limiting the execution time of mobile agents," in In Proceedings of IEEE Eight International Symposium on Computers and Communciation (ISCC'03), Kerner-Antalya, Turkey.
  10. A. M. Ngereki. and A. M. Kahonge. 2015 "A Multi-Faceted Approach to Mobile Agent Security," International Journal of Computer Applications, vol. 120, no. 21, pp. 20-25.
  11. Sandya A., & A., Caully 2011 "Obfuscation Techniques for Mobile Agent code confidentiality," Journal of information & Systems Management, vol. 1, no. 1, pp. 25-36.
  12. P. J. Anderson 1972 "Computer Security Technology Planning study, Bedford MA: Technial Report ESD-TR-72-51," Air Force electronice Division, Hanscom AFB.
  13. Ibharalu FT., A. B. Sofoluwe and T. A. A. , 2011 "A reliable protectioin architectur for mobile agents in open network system," International Journal of Computer applications, vol. 17, no. 7, pp. 6-14.
  14. P. Nisha, K. Sunil and A. B. 2010 "Security on Mobile Agent BAsed Crawler," International Journal of computer applications, vol. 17, no. 15, pp. 5-11.
  15. A. Shibli, Y. I. and M. S. 2010 "MagicNET: Security system for protection of mobile agent," in In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications.
  16. S. Leriche and Arcangeli J. , 2010 "Flexible architectures of adaptive agents: the agents approach," International Journal of grid computing and multi agent systems, vol. 1, no. 1, pp. 55-75.
Index Terms

Computer Science
Information Sciences

Keywords

Security Mobile Agent Reference Monitor Trusted Third Party