CFP last date
20 January 2025
Reseach Article

Mobile Agent Systems with Multiple layers of Security

Published on September 2015 by Preeti R. Hargunani, Sulkashana A. Borsune, Aarti G. Ambekar
CAE Proceedings on International Conference on Communication Technology
Foundation of Computer Science USA
ICCT2015 - Number 2
September 2015
Authors: Preeti R. Hargunani, Sulkashana A. Borsune, Aarti G. Ambekar
304fc538-8a9f-4569-a89a-59a42201384b

Preeti R. Hargunani, Sulkashana A. Borsune, Aarti G. Ambekar . Mobile Agent Systems with Multiple layers of Security. CAE Proceedings on International Conference on Communication Technology. ICCT2015, 2 (September 2015), 17-22.

@article{
author = { Preeti R. Hargunani, Sulkashana A. Borsune, Aarti G. Ambekar },
title = { Mobile Agent Systems with Multiple layers of Security },
journal = { CAE Proceedings on International Conference on Communication Technology },
issue_date = { September 2015 },
volume = { ICCT2015 },
number = { 2 },
month = { September },
year = { 2015 },
issn = 0975-8887,
pages = { 17-22 },
numpages = 6,
url = { /proceedings/icct2015/number2/22641-1542/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 CAE Proceedings on International Conference on Communication Technology
%A Preeti R. Hargunani
%A Sulkashana A. Borsune
%A Aarti G. Ambekar
%T Mobile Agent Systems with Multiple layers of Security
%J CAE Proceedings on International Conference on Communication Technology
%@ 0975-8887
%V ICCT2015
%N 2
%P 17-22
%D 2015
%I International Journal of Computer Applications
Abstract

In today's modern era of internet and intranet where distributed networking is spreading out its effects to every nook and corner of globe, it is essential to focus on both internet and intranet facilities. Mobile agent technology can be seen as a bright emerging technology which can be equally beneficial to internet applications as well as intranet applications. It is a piece of code that can move within a given network and act and make decisions autonomously on behalf of a user/application. For real time applications mobile agents can be used as data collection agents, action triggering agents. There can be a vast number of mobile agent applications. While mobile agent applications are evolving, the point of concern remains is the Security implementations on mobile agents. This paper gives extension of work on mobile agents by working on parallel processing mobile agents and by using Java language's one of the security feature.

References
  1. Muhammad AwaisShibli, SeadMuftic,"MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents", ISBN 978-89-5519-139-4, ICACT 2009.
  2. Tarig Mohamed Ahmed, PhD, "Generate Sub-Agent Mechanism to Protect Mobile Agent Privacy", IEEE 2012.
  3. Joachim Baumann, Kurt Rothermel, "The Shadow Approach: An Orphan Detection Protocol for Mobile Agents", Second International Workshop, Germany, 1998.
  4. M. VigilsonPrem, S. Swamynathan, "Securing Mobile Agent and its Platform from Passive Attack of Malicious Mobile Agents", IEEE-International Conference on Advances in Engineering, Science and Management (ICAESM -2012) March 30, 31, 2012.
  5. Danny B. Lange and Mitsuru Oshima, "Programming and Developing Java Mobile Agents with Aglets". (Addison Wesley publication).
  6. T. Sander and C. F. Tschudin, "Protecting Mobile Agents against Malicious Hosts". G. Vigna, editor, Mobile Agents and Security, volume 1419 of LNCS, pp. 44-60. Springer-Verlag, June 1998.
  7. F. Hohl, "Time Limited Blackbox Security". G. Vigna, editor, Mobile Agents and Security, Volume 1419 of LNCS, pp. 97-102. Springer-Verlag, June 1998.
  8. William M. Farmer, Joshua D. Guttman, and Vipin Swarup, "Security for Mobile Agents: Issues and Requirements", The MITRE Corporation, 202 Burlington Road, Bedford, MA 01730-1420
  9. Ajay Chander, John C. Mitchell, Insik Shin "Mobile code security by java bytecode instrumentation".
  10. Evens Jean, Yu Jiao, Ali R. Hurson, Thomas E. Potok, "SAS: A Secure Aglet Server", computer security conference 2007, April 11-13, 2007, USA.
  11. Wayne Jansen, Tom Karygiannis "Mobile Agent Security", NIST Special Publication 800-19.
  12. Kurt Rothermel, and Markus Schwehm, "Mobile Agents", Encyclopedia for Computer Science and Technology, New York: M. Dekker Inc. , 1998.
  13. http://en. wikipedia. org/wiki/Mobile_agent
  14. http://www. davidreilly. com/topics/software_agents/mobile_agents/
  15. http://stackoverflow. com/questions/1741545/java-calculate-sha-256-hash-of-large-file-efficiently
  16. http://www. flexiprovider. de/examples/ExampleDigest. html
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Agent Security Mobile Agents Socket Connection Hashing Techniques Java Byte Code Parallel Processing.