International Conference on Advances in Computer Engineering and Applications |
Foundation of Computer Science USA |
ICACEA - Number 3 |
March 2014 |
Authors: Swati Aggarwal, Heman Pathak, Avdhesh Gupta |
b3900d7c-4de9-40bf-85c2-a3cf16864c23 |
Swati Aggarwal, Heman Pathak, Avdhesh Gupta . A Secured Layered Architecture for Mobile Agent. International Conference on Advances in Computer Engineering and Applications. ICACEA, 3 (March 2014), 23-28.
Mobile Agent (MA) technology is one of the most brilliantgrounds of scattered computing. Mobile agents are independent programs that wander the internet from machine to machine under their own control on behalf of their users to carry outexact predefined tasks. A mobile agent can postponed its execution at any point; relocate itself to another machine then start again execution at the new machine without any loss of state. This type of Mobile Agent can hold different types of data and that data should be sheltered from dissimilar types of attacks. Thus security is one of the most talented areas for the researchers functioning in the field of scattered computing. Stillplenty of research has been done in this area and a variety of solutions and approaches has been projected but still there is lots of scope to improve them or to set up new method to solve the security problem related to MA. This paper suggests a layered architecture to offer security to the hosting platform as well as to the MA. Architecture uses a variety ofconcept such as authentication, authorization, confidentiality, encapsulation, intrusion detection and trust & reputation. Here malicious hosts are identified according to their reputation and MA is allowed to be executed only on the trusted platform. Similarly, for the security of the hosts, only certified MA is authorized to be executed on host and its behaviour are observed by the platform. In this way proposed architecture not only protects its own environments but also guide other components of network to identify malicious hosts and MAs.