Securing Mobile Agent Using Dummy and Monitoring Mobile Agents  

Abstract

Mobile agent is a very important concept for distributed computing & utilizing the resources available on the connected network because of their capability of operation  on different environments that is why the approach is used for many network based applications like data crawling, information exchange,  distributed system integrity etc. but it lacks the security aspects when applied to open network where nodes cannot be classified as they are  malicious or not, hence for the cases where the security of data  or reliability of agent became must we need some method to insure the things discussed above. Although many other methods are proposed by many authors but some of them required a pre survey [1], encryption of important data [2] acknowledgement schemes [3], here we are proposing a scheme which not only confirms the security of data but also  guarantees the   uninterrupted operation of agent by utilizing a dummy agent and composite acknowledgement technique. 

Authors and Affiliations

Neelesh Kumar Panthi , Ilyas Khan , Vijay k. Chaudhari

Keywords

Related Articles

Performance Analysis Of Guaranteed Packet Transfer In Coverage Area And Less Coverage Area For MANET

The main challenge in mobile adhoc network is guaranteed transfer of packet within coverage area and less coverage area. The hierarchical clustering is used to increase coverage area to reduce the packet loss in MANET.Th...

Performance Enhancement of MC-CDMA System through STTC based STBC Site Diversity

The combination of multiple antennas and multicarrier code division multiple access (MC-CDMA) is a strong candidate for the downlink of future mobile communications. The study of such systems, in scenarios that model rea...

Text database cleaning by filling the Missing values using Object Oriented Intelligent Multi-Agent System Data Cleaning Architecture

Agents are software programs that perform tasks on behalf of others and they are used to clean the text database with their characteristics.  Agents are task oriented with the ability to learn by them...

 Fault-Tolerance and Permutation Analysis of ASEN and its Variant

 High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory mo...

 A new horizon in data security by Cryptography & Steganography 

Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic t...

Download PDF file
  • EP ID EP150127
  • DOI -
  • Views 87
  • Downloads 0

How To Cite

Neelesh Kumar Panthi, Ilyas Khan, Vijay k. Chaudhari (2010). Securing Mobile Agent Using Dummy and Monitoring Mobile Agents  . International Journal of Computer Science and Information Technologies, 1(4), 208-211. https://europub.co.uk/articles/-A-150127