Distribution of RSA Public Key with Security Device based Identity for Multi-Agent secured Distributed Computing System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: In Mobile Agent Technology, interoperability between agents is indispensably to secure the data from malicious agents under Multi-Agent System. To protect data and agents from malicious attacks, the multi-agent system essentially needs to offer secure communication and access control mechanisms. Hence the digital signature and cryptosystem of asymmetric key based encryption and decryption provides secure communication and increases the confidentiality of accessing services designated only to a determined group of users. However, for the distribution of public key between agents we need to identify the trusted agent. The identification of trusted agent in a multi-agent platform is a challenging work. The technique of adapting USB Dongle is like a security device, which makes the identity of trusted agent, gives a robust mechanism for the identification of trusted agents in a Multi-Agent secured Distributed Computing System. In addition to that bio-metric based finger print sensor enables the owner’s physical contribution to access the data.
Authors and Affiliations
Sugumaran S , Kumaravelu R
Qos Parameters of an Energy Efficient Multicast Congestion Control Protocol (Eemccp) Over Fading Channels
In this paper we propose an energy efficient multicasting congestion control protocol for mobile ad hoc networks (MANETs) over fading channels. Our proposed scheme overcomes the disadvantages of existing multicast conges...
Simulation of ONVIF Network Devices Using JAVA
Abstract : In today’s world, cross platform integration of application plays important role to achieve economic viability and usability of the product. This paper describes technical details of the successfully implement...
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger vein authentication scheme is a non imitable biometric authentication scheme. By using this biometric authentication, we can prevent the non license from driving. So we will avoid accidents. The proposed &...
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter Measures
Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but s...
Influence of Socioeconomic Status and Expectations among Completely Edentulous Patients on Conventional Complete Denture Treatment
Objective: The purpose of this study was to determine the effect of socioeconomic status on patient expectation from the treatment through a Questionnaire based survey. Material and Method: The Present study was conducte...