We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Study of Risks for Mobile Agents on Various Domains

Published on January 2014 by Hans Raj, V.s. Dhaka
International IT Summit Confluence 2013-The Next Generation Information Technology Summit
Foundation of Computer Science USA
CONFLUENCE2013 - Number 1
January 2014
Authors: Hans Raj, V.s. Dhaka
e5bb63a7-ae98-491e-bdda-01eefec12c32

Hans Raj, V.s. Dhaka . Study of Risks for Mobile Agents on Various Domains. International IT Summit Confluence 2013-The Next Generation Information Technology Summit. CONFLUENCE2013, 1 (January 2014), 26-29.

@article{
author = { Hans Raj, V.s. Dhaka },
title = { Study of Risks for Mobile Agents on Various Domains },
journal = { International IT Summit Confluence 2013-The Next Generation Information Technology Summit },
issue_date = { January 2014 },
volume = { CONFLUENCE2013 },
number = { 1 },
month = { January },
year = { 2014 },
issn = 0975-8887,
pages = { 26-29 },
numpages = 4,
url = { /proceedings/confluence2013/number1/15115-1306/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International IT Summit Confluence 2013-The Next Generation Information Technology Summit
%A Hans Raj
%A V.s. Dhaka
%T Study of Risks for Mobile Agents on Various Domains
%J International IT Summit Confluence 2013-The Next Generation Information Technology Summit
%@ 0975-8887
%V CONFLUENCE2013
%N 1
%P 26-29
%D 2014
%I International Journal of Computer Applications
Abstract

In the modern communication system for Mobile agent, where security is major issue to safe transfer the data by secure method. Mobile agents have autonomous software entity when a mobile agent works in the host environment due to security problem raises during functioning, for the high security it resume its execution in another host after suspend its execution in previous host. Due to this it can be loss some of its important data (i. e. Personal information, internal code, state and password). This personal information is updated by host and another mobile agent working under same host environment. In this research paper, an algorithm is proposed to secure mobile agent from the agent platform in which they can execute to do their necessary computation. So in this system various agents work concurrently and use their resources for concerned host platform in random manner. Mobile agent can travel in different number of hosts in distributed network; during the journey it can change its state and secret code. Mobile agent technology has many benefits but it has a possibility risks from risky platform that can change their internal state and code. In this proposed system/infrastructure SAB (Security Alert Bank) serves as a group of agent platform, which is called domain. The SAB maintains information about the domain, which is used by mobile agents to decide whether it is safe to visit the domain or not.

References
  1. W. Jansen and T. Karygiannis," NIST Special publication 800-19-Mobile Agent Security"in NIST Journal of Computer Scince, Vol. 2, No. 3, March 1999.
  2. A. Corradi,R. Montanari and C. Stefanelli, "Security Issues in Mobile agent technology", in IEEE Journal, Vol. 1, No 5,april 1999. .
  3. F. Omar Rana and W. Warker David," A Performance Model For Task and Interaction Patterns in Mobile Agent System", in IEEE Journal, Vol. 16, No. 8, Feb 2000.
  4. M. chun Man and K. Wei,Victor "A Taxonomy for Attacks on Mobile Agents", in IEEE Journal, Vol. 12, No. 6,may 2001.
  5. L. Papavassi Symeon and Ye Jian, "Mobile Agent Based Approach for Efficient Network management and Resource Allocation: frame work and Application", in IEEE Journal of Selected Areas in Communication, Vol. 20, no. 4, may 2002.
  6. S. John, H. Shen, C. S. Leung, and G. Young," Analysis on a Mobile Agent Based Algorithm for Network Routing and Management", IEEE Transaction on Parallel and Distributed system, Vol. 14, N0. 3, march 2003.
  7. Ma Lu, J. P. Tsai Jaffery and T. Murata," A secure Mobile System Model Based on Extended Elementary Object System" in IEEE Journal,Vol 9, No. 13,june 2004.
  8. L. Ching, V. Vijay and W. Yan, P. Vineet, "Trust Enhanced Security for Mobile Agents", in Proceeding of Seventh IEEE International conference on E-Commerce Technology,Vol. 4, NO. 6, May 2005.
  9. S. Iraj, K. Ijaz, M. Umar, S. Arshad Ali,"A Fault Tolrent Infrastructure for Mobile agents", in IEEE Journal, Vol 2 No. 1,june 2006.
  10. L. Ismail College of IT United Arab Emirates University P. O. Box 17551, Al-Ain, United Arab Emirates Journal of Communications, Vol. 3, no. 2, April 2008.
  11. D. Priyanka, Dr. K. Dutta, and Prof. M. C. Govil,"Security Issues in Mobile Agents", International Journal of Computer Applkications, Vol. 11- No. 4. Dec. 2010.
  12. H. Raj, G. Singh Sekhon, "Security Issues and Domain Based Security for Mobile Agents", in an International Journal of Engineering Sciences. ISSN: 2229-6913, special issues of RACS'11, pp 114-123 2011.
  13. S. Armoogum, A. Caully," Obfuscation Techniques for Mobile Agent code confidentiality", Journal of Information & Systems Management, Volume 1 Number 1 March 2011 .
  14. V. Rajguru Prakash, B. Deshmukh Sushant," Analysis of Mobile Agent", Journal of Global Research in Computer Science, Volume 2, No. 11, November 2011
  15. Y. Singh, K. Gulati and S Niranjan," Dimensions and Issues of Mobile Agent Technology", International Journal of Artificial Intelligence &Applications (IJAIA), Vol. 3, No. 5, September 2012.
  16. P. Ahuja1, V. Sharma," A JADE Implemented Mobile Agent Based Host Platform Security", Computer Engineering and Intelligent Systems, ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No. 7, 2012.
  17. D. Sheela, V. R. Srividhya. Vrushali, A. varshini and J. Jayashubha," A. Mobile Agent Based Security System of Wireless Sensor Networks against Cloning and Sink Hole Attacks", International Conference on Computational Techniques and Artificial Intelligence (ICCTAI'2012) Penang, Malaysia,vol 2 issue 3, no. 299 to 305 2012.
  18. Najmus Saqib Malik, Friedrich Kupzog Institute of Computer Technology Vienna University of Technology Vienna, Austria malik, kupzog@ict. tuwien. ac. "Domain based Security for Mobile Agents".
  19. R. Shrivastava, P. Mehta (Gahoi)," Analysis of Secure Mobile Agent System", International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
  20. M. Aggarwal, Nipur, Pallavi," Hierarchal Model to Prevent DoS Attack in Mobile Agents", International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS - 2012) Proceedings published in International Journal of Computer Applications® (IJCA) (0975 – 8887),vol 4, issue 2, no 7 to 11 2012.
  21. B. Anil, D. Girish Agrawal, Prof. P. Patil,"Mobile Agent Synchronization And Security Issue International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181,Vol. 1 Issue 10, December- 2012.
  22. B. Chouksey, R. Mohan," Performance Enhancement of Secured Mobile Agents in Distributed Database Using Local Database,International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 3, 116 March 2012.
  23. S. Aggarwal, S. Bhardwaj, P. Kumar," Security Approaches For Mobile Multi-Agent System", International Journal of Emerging Technology and Advanced Engineering Website: www. ijetae. com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 2, Issue 12, December 2012).
  24. Dr. A. K. Sharma, A. Mishra, V. Garg," Mobile Agents Security against Malicious Hosts – Review", International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.
  25. S. Upadhye P. G. Khot," Optimize Security solution for mobile agent security: A Review", International Journal of Engineering and Computer Science ISSN: 2319-7242, Volume 2 Issue 1 Page No. 322-329 Jan 2013.
  26. FIPA-Foundation for intelligent physical agents. http://www. fipa. org.
  27. W. Stallings, Cryptography and Network Security, Fourth Edition, Prentice Hall.
  28. L. Du, Q. Hu, "Analysis of Bidding Behaviour on eBay Auctions", in Proc. of IEEE International Conference on e-Business Engineering, pp 33 - 38.
Index Terms

Computer Science
Information Sciences

Keywords

Security Domain Agent Platform Security Issues Sab.