Enhancing Mobile Agent Security Level (Proposed Model)
Keywords:computer network, security, mobile agent, mobile agent security, encryption.
Mobile agents are application design schemes for distributed systems that consist of mobile code ideology including Mobile agent software. In the last period mobile computing process had a vision that’s a set of execution code that’s move from platform to another in the heterogeneous network with an ability of carrying there result and updating them self-sate.
This paper presents several enhancements on mobile agent security and provides generalized code protection. Several novel techniques are proposed to protect mobile agents in any environments and to describe and solve practical problems in the mobile agent system.
Foreman, P. 2019. Vulnerability management. Book. CRC Press.
Dittrich, D., Reiher, P. and Dietrich, S., 2004. Internet denial of service: Attack and defense mechanisms. Pearson Education.
Anjum, F., &Tassiulas, L. 1999. On the behavior of different TCP algorithms over a wireless channel with correlated packet losses. In Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (pp. 155-165).
Armitage, G. 2003. An experimental estimation of latency sensitivity in multiplayer Quake 3. In The 11th IEEE International Conference on Networks, 2003. ICON2003. (pp. 137-141). IEEE.
Tomas Sander and Christian F. Tschudin, 1998, Protecting Mobile Agent against Malicious Hosts, In Giovanni Vigna, Mobile Agent Security, pp. 44-60, Springer-Verlag, Herdeberg Germany.
Stamos, J. W., & Gifford, D. K. 1990. Remote evaluation. ACM Transactions on Programming Languages and Systems (TOPLAS), 12(4), 537-564.
Vittal, J. 1981. Active message processing: Messagesas messengers. In Proc. of IFIP TC-6 InternationalSymposium on Computer Message Systems (pp. 175-195).
Harrison, C. G., Chess, D. M., &Kershenbaum, A. 1995. Mobile Agents: Are they a good idea? (pp. 25-47). Yorktown Heights, New York: IBM TJ Watson Research Center.
Hohl, F. 1997. An approach to solve the problem of malicious hosts. Universitaet Stuttgart FakultaetInformatik, Bericht, (1997/03).
Farmer, W. M., Guttman, J. D., &Swarup, V. 1996. Security for mobile agents: Issues and requirements. In Proceedings of the 19th national information systems security conference (Vol. 2, pp. 591-597).
Mana, A., & Pimentel, E. 2001. An efficient software protection scheme. In IFIP International Information Security Conference (pp. 385-401). Springer, Boston, MA.
Loureiro, S., &Molva, R. 2000. Mobile code protection with smartcards. In 6th ECOOP Workshop on Mobile Object System. Cannes. France.
Necula, G. C. 2001. A scalable architecture for proof-carrying code. In International Symposium on Functional and Logic Programming (pp. 21-39). Springer, Berlin, Heidelberg.
Vijayalakshmi, A. and Palanivelu, T.G. 2017. Intelligent mobile agents collaboration for the performance enhancement in wireless sensor networks, Int. J. Signal and Imaging Systems Engineering, Vol. 10, Nos. 1/2, pp.72–83.
BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications. Security and Communication Networks, 2017.
Shehada, D., Yeun, C. Y., Zemerly, M. J., Al Qutayri, M., Al Hammadi, Y., Damiani, E., & Hu, J. 2017.
Nandakumar, R., & Nirmala, K. 2018. Enhancing Packet-Level Security in Mobile Ad-Hoc Networks. Indian Journal of Science and Technology, 11, 1.
Toumi, H., Fagroud, F. Z., Zakouni, A., &Talea, M. 2019. Implementing Hy-IDS, Mobiles Agents and Virtual Firewall to Enhance the Security in IaaS Cloud. Procedia Computer Science, 160, 819-824.
Schneier, B. 1993. Description of a new variable-length key, 64-bit block cipher (Blowfish). In International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg.
How to Cite
Copyright (c) 2020 Mohammad Al-sharaiah A., Khazaaleh Murtaza Kh., Feras Haziemeh A.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The articles published in International Journal of Computer and Information Technology (IJCIT) is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.