CFP last date
20 December 2024
Reseach Article

Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks

by Bindiya Bhatia, M. K. Soni, Parul Tomar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 7
Year of Publication: 2017
Authors: Bindiya Bhatia, M. K. Soni, Parul Tomar
10.5120/ijca2017913633

Bindiya Bhatia, M. K. Soni, Parul Tomar . Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks. International Journal of Computer Applications. 163, 7 ( Apr 2017), 58-65. DOI=10.5120/ijca2017913633

@article{ 10.5120/ijca2017913633,
author = { Bindiya Bhatia, M. K. Soni, Parul Tomar },
title = { Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 7 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 58-65 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number7/27411-2017913633/ },
doi = { 10.5120/ijca2017913633 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:09:35.595091+05:30
%A Bindiya Bhatia
%A M. K. Soni
%A Parul Tomar
%T Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 7
%P 58-65
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the emerging world, in a resource constrained network like mobile ad hoc network, the mobile agent is becoming a favorable option for creating applications like service discovery, network discovery, automatic network reconfiguration etc. due to its astonishing features like autonomy and mobility. The joint venture of the two technologies mobile agent and mobile ad hoc network is contributing towards an ameliorate communication. There are diverse issues that are associated with mobile ad-hoc networks like the unexpected change in topology, mobility, power constraint, bandwidth limitation etc. A mobile agent is one of the solutions to conquer these challenges. A mobile agent interacts with the node in a better way and provides enhanced options for the developers to design applications based on the disconnected network. Although mobile agents take advantages over the general client-server applications, still, the mobile agents are at high-security risks due to its mobility and autonomy. The various security solutions are there to secure the mobile agents. But not all the security solutions precisely work in the mobile ad-hoc network because the network is unpredictable and subject to dynamic change in topology. The paper intends to review the vulnerabilities associated with mobile agents when applied in the mobile ad-hoc networks and studies the various approaches to overcome the risks associated with mobile agents.

References
  1. Abdulrahman Hijazi, 2005. Using Mobile Agents for Intrusion Detection in Wireless Ad Hoc Networks. Wireless and Optical Communications Networks. WOCN 2005. Second IFIP International Conference on March 6 – 8. 2005.
  2. Alexandre Manguer, 2003. Mobile agents in ad hoc networks. Thesis. April 2003.
  3. B. Askwith, M. Merabti, Q. Shi and K. Whiteley. 1997. Achieving User Privacy in Mobile Networks. Proceedings of the 13th Annual Computer Security Applications Conference. San Diego. pp. 108-116.
  4. Borselius, N. Mobile agent security. 2002. The Electronics & Communication Engineering Journal. Vol 5. pp. 211–218.
  5. Prakirti Raghuvanshi et al. 2015. A Modified Agent Based AODV Routing Protocol for MANET’s. (IJCSIT) International Journal of Computer Science and Information Technologies. Vol. 6 (4). 3298-3301
  6. Chaum. 1985. Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of ACM. Vol 28. No 10. pp. 1030-1044.
  7. F. Hohl. 1998. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. Appear in Mobile Agents and Security Book edited by Giovanni Vigna. Published by Springer Verlag.
  8. G. C. Necula, P. Lee. 1997 Research on proof-carrying code on mobile-code security. DARPA Workshop on Foundations for secure mobile code. March 26-28, 1997.
  9. G. Geetha, C. Jayakumar. 2011. Trust Enhanced Data Security in Free Roaming Mobile agents Using Symmetric Key cryptography. International Journal of Network Security & Its applications (IJNSA). Vol.3. No.5.
  10. Haghighat, R., Yarahmadi, 2008. H. A New Approach for Mobile Agent Security. In: The Proc. of the World Acadamy of Science, Engineering and Technology. vol. 32.
  11. Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks Vol 1. pp. 13–64.
  12. Karlsson, Jonny,Dooley, Laurence S. and Pulkkis, Goran. 2012. Routing Security in Mobile Ad-hoc Networks. Issues in Informing Science and Information Technology. Volume 9, 2012. pp 369 – 383.
  13. L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, S. Schwab, and P. LeBlanc. 2003. Self- Protecting Mobile Agents Obfuscation Report. Report #03-015. Network Associates Laboratories. June 2003.
  14. Nikos Migas, William J.Buchanan, and Kevin A. Mcartney. 2003. Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks. in proceeding of 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems (ECBS'03).
  15. N Kawaguchi, K Toyama, Y Inagaki. 2000. MAGNET: ad hoc network system based on mobile agents. computer communication. volume 23. issue 8. pp 705-782.
  16. N. Minar, K.H. Kramer, and P. Maes. Cooperating Mobile Agents for Dynamic Network Routing. MIT Media Lab. Link: http://xenia.media.mit.edu/~nelson/research/ routes-book chapter/minar.pdf
  17. Rajesh Shrivastava, Pooja Mehta (Gahoi). 2012. Analysis of Secure Mobile Agent System. International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307. Volume-2. Issue-1.
  18. Rizvi, S.M.S.I., Sultana, Z., Bo, S., Islam, M.W. 2010. Security of Mobile Agent in Ad hoc Network using Threshold Cryptography. In: The Proc. of the International Conference on Cryptography, Coding and Information Security.
  19. R. Pushpa Lakshmi, A. Vincent Antony Kumar. 2010. Cluster Based Composite Key Management in Mobile Ad Hoc Networks. International Journal of Computer Applications (0975 – 8887). Volume 4 – No.7.
  20. R.R. Chpudhury, S. Bandyopadhyay, and K. Paul. 2000. A distributed mechanism for topology discovery in ad hoc wireless networks using mobile agents. In Proceedings of First Annual Workshop on Mobile Ad Hoc Networking Computing. MobiHOC Mobile Ad Hoc Networking and Computing. August 11, 2000
  21. R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. 1993. Efficient software-based fault isolation. In Proceedings of the 14th ACM Symposium on Operating Systems Principles. Pages 203—216. Dec. 1993.
  22. Saleh Ali K.Al-Omari, Putra Sumari. 2010. An overview of mobile adhoc networks for the existing protocol and applications. International journal of application of graph theory in wireless ad-hoc networks and sensor networks. Vol 2. No.1.
  23. Samuel Lee. Mobile Agents. A tutorial report. Agent based software engineering.
  24. Sathish Alampalayam Kumar. 2010. Classification and Review of Security Schemes in Mobile Computing. Wireless Sensor Network. vol 2. pp 419-440
  25. Shivanajay Marwaha, Chen Khong Tham, Dipti Srinivasan. 2002. Mobile Agents based Routing Protocol for Mobile Ad Hoc Networks. Global Telecommunications Conference, GLOBECOM '02. IEEE volume 3. pp 17-21.
  26. Sultanik, et al. 2003. Secure Mobile Agents on Ad Hoc Wireless Networks. The Fifteenth Innovative Applications of Artificial Intelligence. Conference Acapulco. Mexico.
  27. Tarig, M.A. 2009. Using secure-image mechanism to protect mobile agent against malicious host. In: Proc. of World Academy and Science, Engineering and Technology. pp. 439–444.
  28. Vishnu Kumar Sharma, Sarita Singh Bhadauria. 2012. Agent based Congestion Control Performance in Mobile ad-hoc Network: A Survey paper. (IJACSA) International Journal of Advanced Computer Science and Applications. Special Issue on Wireless & Mobile Networks.
  29. W. M. Farmer, J. D. Guttman, and V. Swarup. 1996. Security for mobile agents: Authentication and state appraisal. in Proceedings of the European Symposium on Research in Computer Security (ESORICS’96). ser. Lecture Notes in Computer Science, E. Bertino, H. Kurth, G. Martella, and E. Montolivo. Eds vol. 1146. Rome. Italy: Springer. September 1996. pp. 118–130.
  30. Zhang Yi, Zhu Lina and Feng Li. 2009. Key Management and Authentication in Ad Hoc Network based on Mobile Agent”, Journal of Networks, Vol. 4, No. 6.
  31. Mats Person, 2000. Mobile Agent Architectures. Scientific Report. Dec 2000. Defence Research Establishment. ISSN 1104-9154.
  32. Chandreyee Chowdhury, Sarmistha Neogy. 2011. Securing mobile agents in manet against attacks using trust. International Journal of Network Security & Its Applications (IJNSA). Vol.3. No.6.
  33. Riordan J., B. Schneier. 1998. Environmental key generation towards clueless agents. in Mobile agents and security. Springer. p. 15-24.
  34. M. Darji, B.Trivedi. 2012. Secure Leader Election Algorithm Optimized for Power Saving. Proceedings of international conference on Recent Trends in Computer Networks and Distributed Systems Security. Trivandrum. India. October 11-12. DOI: 10.1007/978-3-642-34135-9.
  35. Bindhu.R. 2010. Mobile Agent Based Routing Protocol with Security for MANET. International Journal of Applied Engineering Research. Dindigul Volume 1. No1.
  36. Neogy, R.; Chowdhury, C.; Neogy, S. 2012. A reliable service discovery protocol using mobile agents in MANET. Reliability and Maintainability Symposium (RAMS). Proceedings – Annual. vol. no. 7. pp. 23-26. Jan, 2012. doi: 10.1109/RAMS.2012.6175451.
  37. Hamad, H. 2008. Distributed Mobile Agents for reliable cluster management in MANETs. International Journal of Interactive Mobile Technologies (iJIM). Issue 2. vol. 2. Apr. 2008. pp. 11-17.
  38. B Bhatia, M K Soni, P Tomar. 2015. Role of Mobile Agent in Layered Architecture of Mobile Ad-Hoc Networks. I. J. Computer Network and Information Security. 11, 37-45, DOI:10.5815/ijcnis.2015.11.04
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad-hoc networks mobile agents security trust based techniques cryptography.