Developing Check-Point Mechanism to Protect Mobile Agent Free-Roaming Against Untrusted Hosts

被引:0
|
作者
Ahmed, Tarig Mohamed [1 ]
机构
[1] King Abdulaziz Univ, Dept Informat Technol, FCIT, Jeddah, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 72卷 / 02期
关键词
Mobile agent; security capturing; integrity attacks;
D O I
10.32604/cmc.2022.025582
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile Agent has many benefits over traditional distributed systems such as reducing latency, bandwidth, and costs. Mobile Agent Systems are not fully utilized due to security problems. This paper focuses on mobile agent protection against malicious hosts. A new security mechanism called Checkpoints has been proposed. Checkpoint Mechanism (CPM) aims to protect Mobile Agent against malicious hosts in case of Capturing and Integrity attacks. CPM assumes using a free-roaming mobility mechanism by Mobile agent systems. The main idea behind CPM is to generate multiple versions of Mobile Agent. The multiple version is used to recover Mobile Agent from Capturing and Integrity attacks by untrusted hosts. MA versions are kept in Recovery Host(RH). RH plays a key role in CPM by controlling and monitoring MAs' recovery processes. A prototype method has been used to prove the feasibility of CPM. The p https://dsr.kau.edu.sa/Default-305ARrototype was implemented by using the .Net framework and C#. full discussion for several scenarios has been done to analyze the feasibility and performance for CPM. As found from this research, CPM has a strong ability to protect Mobile Agents from Capturing and Integrity attacks completely. In addition, there is no negative impact on the overall performance of the mobile agent system.
引用
收藏
页码:3849 / 3862
页数:14
相关论文
共 7 条
  • [1] Free-roaming mobile agent (FRoMA) protection against multiple attacks
    Venkatesan, S.
    Chellappan, C.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2009, 3 (04) : 362 - 383
  • [2] A Novel Free-Roaming Mobile Agent Security Protocol Against Colluded Truncation Attacks
    Lei, Silei
    Liu, Jun
    Deng, Chuan
    Xiao, Junmo
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 348 - 353
  • [3] An improved free-roaming mobile agent security protocol against colluded truncation attacks
    Xu, Darren
    Harn, Lein
    Narasimhan, Mayur
    Luo, Junzhou
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 309 - +
  • [4] A Novel Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack by ACK
    Lei, Silei
    Zhang, Rui
    Liu, Jun
    Xiao, Junmo
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 612 - 616
  • [5] Implementation of Trust and Reputation Management for Free-Roaming Mobile Agent Security
    Geetha, G.
    Jayakumar, C.
    IEEE SYSTEMS JOURNAL, 2015, 9 (02): : 556 - 566
  • [6] Using secure-image mechanism to protect mobile agent against malicious hosts
    Ahmed, Tarig Mohamed
    World Academy of Science, Engineering and Technology, 2009, 59 : 439 - 444
  • [7] A free-roaming mobile agent security protocol based on anonymous onion routing and k anonymous hops backwards
    Wang, Xiaogang
    Xu, Darren
    Lu, Junzhou
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 588 - +