mobile agent security
Recently Published Documents


TOTAL DOCUMENTS

61
(FIVE YEARS 6)

H-INDEX

9
(FIVE YEARS 0)

2021 ◽  
pp. 290-302
Author(s):  
Pradeep Kumar ◽  
Niraj Singhal ◽  
Mohammad Asim ◽  
Ajay Kumar ◽  
Mahboob Alam

Author(s):  
Mohammad Al-sharaiah A. ◽  
Khazaaleh Murtaza Kh. ◽  
Feras Haziemeh A.

Mobile agents are application design schemes for distributed systems that consist of mobile code ideology including Mobile agent software. In the last period mobile computing process had a vision that’s a set of execution code that’s move from platform to another in the heterogeneous network with an ability of carrying there result and updating them self-sate. This paper presents several enhancements on mobile agent security and provides generalized code protection. Several novel techniques are proposed to protect mobile agents in any environments and to describe and solve practical problems in the mobile agent system.


2020 ◽  
pp. 221-230
Author(s):  
Sophia Alami-Kamouri ◽  
◽  
Nabil Moukafih ◽  
Ghizlane Orhanou ◽  
Said Elhajji

Mobile agent system is a satisfying solution for the implementation and maintenance of applications distributed over large-scale networks, this solution is very used in solving complex problems since they are autonomous, Intelligent, robust and faulttolerant. Mobile agents have the capacity to migrate from one node to another all over the network allowing reduction in communication costs. Although they possess all these advantages, using them in distributed environment increases the threat to mobile agent security and during their mobility they can face different types of attacks such as of attacks like Replay attack, man-in-the-middle attack, Cookie theft attack, Offline password guessing attack, Stolen-verifier attack. In this paper we investigate the security of distributed mobile agent system. We propose a solution based on a secure Elliptic Curve Cryptography (ECC) protocol to ensure mutual authentication and protect the agent from different known attacks. The implementation of the proposed solution is obtained using Java Agent Development Framework (JADE). Also, Binary serialization is used to establish a flexible portability of the agent. Finally, we present security and performance analysis, for our solution to secure mobile agent in distributed systems.


2015 ◽  
Vol 15 (2) ◽  
pp. 381
Author(s):  
Razouki Hassan ◽  
Hair Abdellatif

The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes it to travel often in open network. In this scenario, it is obvious that the mobile agents are vulnerable to various security threats. Protecting free-roaming mobile agents from malicious host and from other mobile agents has drawn much attention in recent years. The protection of mobile agents is considered as one of the greatest challenges of security, because the platform of execution has access to all the components of the mobile agent. In this paper, we present a new architecture paradigm of mobile agents, which allows the separation of the implementation tasks of the agent and its security mechanisms. Our approach is based on using two strategies of adaptation to adapt the mobile agent security at runtime, depending on the sensitivity of the services required to perform the duties of the agent and the degree of confidence of the visited platforms.


2015 ◽  
Vol 120 (21) ◽  
pp. 20-26
Author(s):  
Anthony M.Ngereki ◽  
Andrew M. Kahonge

Sign in / Sign up

Export Citation Format

Share Document