Securing Mobile Agent Using Dummy and Monitoring Mobile Agents
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
Mobile agent is a very important concept for distributed computing & utilizing the resources available on the connected network because of their capability of operation on different environments that is why the approach is used for many network based applications like data crawling, information exchange, distributed system integrity etc. but it lacks the security aspects when applied to open network where nodes cannot be classified as they are malicious or not, hence for the cases where the security of data or reliability of agent became must we need some method to insure the things discussed above. Although many other methods are proposed by many authors but some of them required a pre survey [1], encryption of important data [2] acknowledgement schemes [3], here we are proposing a scheme which not only confirms the security of data but also guarantees the uninterrupted operation of agent by utilizing a dummy agent and composite acknowledgement technique.
Authors and Affiliations
Neelesh Kumar Panthi , Ilyas Khan , Vijay k. Chaudhari
Performance Analysis Of Guaranteed Packet Transfer In Coverage Area And Less Coverage Area For MANET
The main challenge in mobile adhoc network is guaranteed transfer of packet within coverage area and less coverage area. The hierarchical clustering is used to increase coverage area to reduce the packet loss in MANET.Th...
Performance Enhancement of MC-CDMA System through STTC based STBC Site Diversity
The combination of multiple antennas and multicarrier code division multiple access (MC-CDMA) is a strong candidate for the downlink of future mobile communications. The study of such systems, in scenarios that model rea...
Text database cleaning by filling the Missing values using Object Oriented Intelligent Multi-Agent System Data Cleaning Architecture
Agents are software programs that perform tasks on behalf of others and they are used to clean the text database with their characteristics. Agents are task oriented with the ability to learn by them...
Fault-Tolerance and Permutation Analysis of ASEN and its Variant
High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory mo...
A new horizon in data security by Cryptography & Steganography
Steganography and Cryptography are two popular ways of sending vital information in a secret way. One hides the existence of the message and the other distorts the message itself. There are many cryptographic t...