slugSecuring Mobile Agent and Reducing Overhead Using Dummy and Monitoring Mobile Agents
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 4
Abstract
A mobile agent is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer. The host computer offers the runtime environment for the mobile agents. Mobile agent technology offers several advantages over conventional client-server computing paradigm: reduced network traffic, efficient resource access, dynamic system adaptation, and support for mobile users. Platforms executing mobile agent can be malicious and try to discover the agent intention, to read data transported by agent or modify the agent data, code or state. One obvious security issue is the protection of hosts against possible attacks from suspicious nodes. The cases where the security of data or reliability of agent became must, we need some method to insure the things discussed above. For increasing the security of original mobile agent, we use dummy agent and monitoring agent which increases the overhead. To reduce the overhead, we reduce the size of data of dummy agent.
Authors and Affiliations
Rajesh Shrivastava and Pooja Mehta (Gahoi)
slugFrequency Control in Interconnected A.C. Systems through HVDC Link Using Artificial Intelligence
The Load frequency control in HVDC system has gained importance with the growth of interconnected systems. Hence greater reliance is being placed on the use of special control aids to enhance system security, facilitie...
Cooperative Black Hole Node Detection by Modifying AODV
The black hole attack is a well known severely occurring security threat in wireless mobile ad hoc networks. A black hole is a malicious node that spuriously replies for any route request without having any active rout...
ESTABLISHMENT OF THE RELATIONSHIP BETWEEN OCCUPATIONAL/ JOB STRESS AND OCCUPATIONAL ANXIETY-A STUDY OF MARKETING MANAGERS OF SELECTED INDIAN PRIVATE BANKS AT NAGPUR
Management Facilitator Peter Drucker wrote “Marketing is the distinguishing unique function of the business.” In 1991, Marketing expert Regis Mckenna expressed a viewpoint in Harvard Business Review Article as –“Market...
Goal programming model with the deployment of ATMs machines random demand
We all have experienced the discomfort of waiting in a queue. Unfortunately, this phenomenon is becoming increasingly common in urban societies with increasing population. One of the problems of ATM machines is the lon...
A Complete Metrics Based View to Estimate Software Quality in Component based System
Most of the applications in today’s IT industry are developed with the help of existing codes, libraries, design, open source etc. As the code is accessed in a program it is represented as the software component. Code...