Title :
Securing network using mobile agents
Author :
Anjum, Md Nashid ; Chowdhury, Chandreyee ; Neogy, Sarmistha
Author_Institution :
Dept. of Comput. Sci. & Eng., Jadavpur Univ., Kolkata, India
Abstract :
Protecting mobile agents from malicious host is an active area of research that will enable future applications to utilize the paradigm of computing. In this paper we consider security issue that need to be addressed before multi-agent systems in general, and mobile agents system in particular, can be used for a broad range of commercial applications for the network. Here we propose a scheme to protect the nodes and the mobile agents it spawns from malicious hosts (nodes). Here nodes spawn agents to collect trust information about concerned nodes from its neighborhood. Each agent is given with a list of (concerned) nodes (hosts) to visit, by their owner (a node). The agents, while migrating collect views from other hosts. The concept of dummy agent is used to protect the agents while being enroute from getting lost. Hash based message authentication code is used to detect any malicious host platform that attempts to modify an agent´s code.
Keywords :
message authentication; mobile agents; dummy agent; hash based message authentication code; malicious host; mobile agents system; multiagent systems; security issue; trust information; Decision support systems; Intelligent systems; Aglet; HMAC; Mobile Agent; Security; Trust;
Conference_Titel :
Communications, Devices and Intelligent Systems (CODIS), 2012 International Conference on
Conference_Location :
Kolkata
Print_ISBN :
978-1-4673-4699-3
DOI :
10.1109/CODIS.2012.6422189