Academic Journals Database
Disseminating quality controlled scientific knowledge

Analysis of Secure Mobile Agent System

Author(s): Rajesh Shrivastava | Pooja Mehta (Gahoi)

Journal: International Journal of Soft Computing & Engineering
ISSN 2231-2307

Volume: 2;
Issue: 1;
Start page: 272;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Mobile agent | distributed systems | security.

As a recently emerging distributed computing paradigm, mobile-agent technology attracts great interests because of its salient merits. However, it also brings significant security concerns, among which the security problems between a mobile agent and its platforms are of primary importance. While protecting a platform (platform or host security) can benefit from the security measures in a traditional client-server system, protecting a mobile agent (mobile-agent or code security) has not been met in traditional client-server systems and is a new area emerging with mobile-agent technology. We analyzed the different types of security issues related to mobile agent. After analysis, we found that there are many kind of technology available to ensure mobile agent security. But not a single technology provides complete solution for the same. We proposed an algorithm in which we use monitoring agent and dummy agent in place of original mobile agent. Monitoring agent checks the behavior of next node in the network. If monitoring agent finds the node suspicious, it sends the alert acknowledgment to original agent and original agent doesn’t travel to that suspicious node.

Tango Rapperswil
Tango Rapperswil

     Affiliate Program