Securing Mobile Agent Using Dummy and Monitoring Mobile Agents  

Abstract

Mobile agent is a very important concept for distributed computing & utilizing the resources available on the connected network because of their capability of operation  on different environments that is why the approach is used for many network based applications like data crawling, information exchange,  distributed system integrity etc. but it lacks the security aspects when applied to open network where nodes cannot be classified as they are  malicious or not, hence for the cases where the security of data  or reliability of agent became must we need some method to insure the things discussed above. Although many other methods are proposed by many authors but some of them required a pre survey [1], encryption of important data [2] acknowledgement schemes [3], here we are proposing a scheme which not only confirms the security of data but also  guarantees the   uninterrupted operation of agent by utilizing a dummy agent and composite acknowledgement technique. 

Authors and Affiliations

Neelesh Kumar Panthi , Ilyas Khan , Vijay k. Chaudhari

Keywords

Related Articles

Unsupervised Analysis of Arrhythmias using K-means Clustering

The Electrocardiogram provides the valuable information regarding the cardiovascular diseases. Various methods for classification of arrhythmias have been developed by researchers. Classification can be supervised or uns...

Extraction of P wave and T wave in Electrocardiogram using Wavelet Transform

Significant features of the ECG signal include the P wave, the QRS complex, and the T wave. This paper focuses on the detection of the P wave and T wave. Determining the position of the P wave and T wave is complicated d...

Synthesis of DSP Systems using Data Flow Graphs for Silicon Area Reduction

This paper presents a methodology to reduce the area of DSP architecture on silicon using folding. Folding is particularly important and has impact on large DSP circuits/architectures. This technique is powerful to redu...

Micro-Processor based Improved Ultrasonic Direction and Range Finder

This document gives formatting instructions for authors preparing papers for publication in the Proceedings of an IEEE conference.  The authors must follow the instructions given in the document for t...

Download PDF file
  • EP ID EP150127
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

Neelesh Kumar Panthi, Ilyas Khan, Vijay k. Chaudhari (2010). Securing Mobile Agent Using Dummy and Monitoring Mobile Agents  . International Journal of Computer Science and Information Technologies, 1(4), 208-211. https://europub.co.uk/articles/-A-150127