Corpus ID: 32321735

Security of mobile agent in ad hoc network using threshold cryptography

@article{Rizvi2010SecurityOM,
  title={Security of mobile agent in ad hoc network using threshold cryptography},
  author={S. Rizvi and Zinat Sultana and Bo Sun and Washiqul Islam},
  journal={World Academy of Science, Engineering and Technology, International Journal of Aerospace and Mechanical Engineering},
  year={2010},
  volume={46},
  pages={1039-1042}
}
  • S. Rizvi, Zinat Sultana, +1 author Washiqul Islam
  • Published 2010
  • Computer Science
  • World Academy of Science, Engineering and Technology, International Journal of Aerospace and Mechanical Engineering
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some… Expand
Mobile Agent Security Based on Trust Model in MANET
TLDR
Security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be used for a broad range of commercial applications for MANET are considered. Expand
Computer Network Management & Applying Web Services with Mobile Agent
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is -it reduces networkExpand
Securing network using mobile agents
TLDR
This paper considers security issue that need to be addressed before multi-agent systems in general, and mobile agents system in particular, can be used for a broad range of commercial applications for the network. Expand
Mobile agent based clustering and maintenance using secure routing protocol for mobile ad hoc network
Routing in mobile ad hoc network is the challenging task due to the dynamic nature and resource limitations of network. Network clustering deals with partitioning network into clusters based on someExpand
Vulnerability Analysis of Mobile Agents Praxis in Mobile Ad-Hoc Networks
TLDR
The paper intends to review the vulnerabilities associated with mobile agents when applied in the mobile ad-hoc networks and studies the various approaches to overcome the risks associated withMobile agents. Expand
Securing mobile agent and its platform from passive attack of malicious mobile agents
  • M. V. Prem, S. Swamynathan
  • Computer Science
  • IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012)
  • 2012
TLDR
This paper provides an environment that protects the legitimate mobile agent from the malicious mobile agent that performs passive attacks like eavesdropping, and addresses the code, data and itinerary security issues. Expand
A Reliable Protection Architecture for Mobile Agents in Open Network Systems
TLDR
This paper proposes dynamic protection architecture for mobile agents systems, using Travel Diary Protection Scheme and Platform Registry, which protects and allows mobile agents to roam freely in open networks environment without being compromised in a malicious hosts. Expand
Cluster Based Node Misbehaviour Detection, Isolation and Authentication Using Threshold Cryptography in Mobile Ad Hoc Networks
In mobile ad hoc networks, the misbehaving nodes can cause dysfunction in the network resulting in damage of other nodes. In order to establish secure communication with the group members of aExpand
AN ENHANCED APPROACH FOR SECURING MOBILE AGENTS FROM THE ATTACK OF OTHER MALICIOUS MOBILE AGENTS
The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is begi nning to move toward developing techniques that are oriented towards protecting the agent. AgentExpand
Influence of Mobile Agent Security in Distributed System
TLDR
A brief introduction to the recent researches & developments associated with the field of mobile agents is provided, various security threats is highlighting, and also, the weakest hot-spots of the field which need to be nurtured is touched. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 17 REFERENCES
Key Management and Authentication in Ad Hoc Network based on Mobile Agent
TLDR
Experimental results show that the mobile agent performs very well for improving the success ratio of authentication and enhance security while reducing the communication overhead and resource consumption. Expand
Mobile Agent Security
TLDR
This paper discusses the implementation of two of the security approaches called Mixed Multiplicative Homomorphic Encryption scheme and Secure Dynamic Programming that protect the mobile agents from malicious agent platforms and the agent integrity checking mechanism implemented using SHA1 digest algorithm. Expand
Securing ad hoc networks
TLDR
This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework. Expand
Mobile Agents for Clustering and Routing in Mobile Ad Hoc Networks
TLDR
A mobile agent-based method for clustering and routing in mobile ad hoc networks that uses two agents to perform routing and clustering operations and can be employed for intra-clusters and inter-cluster routing to improve the performance of routing. Expand
Using Secure-Image Mechanism to Protect Mobile Agent Against Malicious Hosts
TLDR
Secure-Image Mechanism (SIM) is proposed as a new mechanism to protect mobile agents against malicious hosts by using the symmetric encryption and hash function in cryptography science. Expand
Protecting Mobile Agents through Tracing
TLDR
A new mechanism based on execution tracing and cryptography that allows an agent owner to determine if some site in the route followed by the agent tried to tamper with the agent state or code is presented. Expand
NIST Special Publication 800-19 – Mobile Agent Security
TLDR
An overview of the range of threats facing the designers of agent platforms and the developers of agentbased applications is provided and a range of measures for countering the identified threats and fulfilling these security objectives are identified. Expand
An Feasible Key Management Scheme in Ad Hoc Network
TLDR
Improved AsmuthBloom (n, t) threshold key management scheme is designed, which cut down the data traffic of key management between higher leaders, and the calculating complexity is reduced greatly, hence the key-exchange efficiency is improved. Expand
A mobile agent architecture for distributed information management
TLDR
This work presents four principles that it has identified as being key to achieving distributed information management and an architecture where mobile agents can move across distributed environments, integrate with local resources and other mobile agents, and communicate their results back to the user. Expand
Mobile agents and the future of the internet
TLDR
It seems likely that, within a few years, nearly all major Internet sites will be capable of hosting and willing to host some form of mobile code or mobile agents. Expand
...
1
2
...