Securing Mobile Agent Using Dummy and Monitoring Mobile Agents  

Abstract

Mobile agent is a very important concept for distributed computing & utilizing the resources available on the connected network because of their capability of operation  on different environments that is why the approach is used for many network based applications like data crawling, information exchange,  distributed system integrity etc. but it lacks the security aspects when applied to open network where nodes cannot be classified as they are  malicious or not, hence for the cases where the security of data  or reliability of agent became must we need some method to insure the things discussed above. Although many other methods are proposed by many authors but some of them required a pre survey [1], encryption of important data [2] acknowledgement schemes [3], here we are proposing a scheme which not only confirms the security of data but also  guarantees the   uninterrupted operation of agent by utilizing a dummy agent and composite acknowledgement technique. 

Authors and Affiliations

Neelesh Kumar Panthi , Ilyas Khan , Vijay k. Chaudhari

Keywords

Related Articles

Combined Text Watermarking

There is a vast amount of digital text data exchanged over the internet for the past few years. Such exchanges necessitate a very robust copyright protection mechanism. This paper presents a new idea on how one can effec...

E-Governance and Effective Deliverance of Information and Services to Citizens Architecture

By Progression of information technology resources in India, great opportunity comes to deliver information and services to citizens and business. Proper distribution and delivery of government information and services t...

A NOVEL APPROACH FOR RETRIEVING AN IMAGE USING CBIR

In this paper we mainly focussed on how to retreive the images from large database. Generally in huge databases we will have large number of images with the same name. when we want to retrieve the image by giving a name,...

A Model of MULTI-VERIFIER channel e-mailing system using Steganographic scheme

In this paper, we presented a model of privileged channel e-mailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model a sender can send a secret m...

Jacobi computation using mobile agent

Physical phenomena occur in a wide range of mathematical applications: from fluid to solid mechanics, electromagnetic and electrical engineering. Engineers working toward an optimized  modelling must...

Download PDF file
  • EP ID EP150127
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

Neelesh Kumar Panthi, Ilyas Khan, Vijay k. Chaudhari (2010). Securing Mobile Agent Using Dummy and Monitoring Mobile Agents  . International Journal of Computer Science and Information Technologies, 1(4), 208-211. https://europub.co.uk/articles/-A-150127