Open Access   Article Go Back

Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection

L. Kathirvelkumaran1 , R. Muralidharan2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 157-163, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.157163

Online published on Jan 31, 2019

Copyright © L. Kathirvelkumaran, R. Muralidharan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: L. Kathirvelkumaran, R. Muralidharan, “Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.157-163, 2019.

MLA Style Citation: L. Kathirvelkumaran, R. Muralidharan "Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection." International Journal of Computer Sciences and Engineering 7.1 (2019): 157-163.

APA Style Citation: L. Kathirvelkumaran, R. Muralidharan, (2019). Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection. International Journal of Computer Sciences and Engineering, 7(1), 157-163.

BibTex Style Citation:
@article{Kathirvelkumaran_2019,
author = {L. Kathirvelkumaran, R. Muralidharan},
title = {Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {157-163},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3478},
doi = {https://doi.org/10.26438/ijcse/v7i1.157163}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.157163}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3478
TI - Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection
T2 - International Journal of Computer Sciences and Engineering
AU - L. Kathirvelkumaran, R. Muralidharan
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 157-163
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
626 366 downloads 263 downloads
  
  
           

Abstract

Mobile Agents (MA) represents a comparatively new computing pattern which is used in numerous verticals as a means for anatomy disseminated applications. These Mobile Agents are programs which work in such a way that it will work independently by moving from one node to another in order to perform the assigned tasks on behalf of its owner in a distributed network. During which the mobile agents will communicate with the other agents or the hosts in the network and preserves the data when routing between one node and another. But it is difficult for the agents to transfer the preserved data to the home node due to lack of reliability. Thus in this Paper, it is discussed about how the mobile agents can preserve the collected data through a Trusted server or node by allocating a protected space in the trusted node and what are the measures are used for securing the data.

Key-Words / Index Term

Mobile Agent, Trusted Server or Node, DSA, Public Key, Host Node

References

[1] Karnik, N. “Protection in mobile agent systems” Technical report University of Minnesota, pp.1-12, 2000
[2] PAhich P.. K. Dutta, and M.C. Govil,“Security Issues in Mobile Agents”, International Journal of Computer Applications, Vol. 11, pp 1-7, December 2010.
[3] D.M. Chess, “ Security issues in mobile code systems".mobile agents and security, Vol 3. LNCS1419. Springer-Verlag 1998.
[4] S.M.S.I. Rizvi, Z. Sultana, B. Sun, and Md. W. Islam,“Security of Mobile Agent in Ad hoc Network using Threshold Cryptography”, World Academy of Science,Engineering and Technology PP.70-75 2010.
[5] S. M.. Moussa, G.A. Agha, “Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management”, Journal of Software, Vol. 5, Jun 2010.
[6] Amro, Belal, Mobile Agent Systems, Recent Security Threats and Counter Measures. International Journal of Computer Science Issues (IJCSI). 11. 146-151,2014
[7] L.Kathirvelkumaran, R.Muralidharan “A Standard Framework And Migration Process of Mobile Agents Using Preprocessing Techniques”, International Research Journal of Computer Science (IRJCS), Vol. 4 , Issue No 06, pp.40-43, June 2017
[8] L.Kathirvelkumaran, R.Muralidharan A Framework for Network Monitoring Performance Management of Mobile Agents Using Pre-Processing Techniques In Distributed Environment International Journal of Pure and Applied Mathematics Vol.119 No. 12, , ISSN: 1314-3395,pp. 13641-13650, 2018
[9] Rajdeep Bhanot and Rahul Hans A Secure and Fault Tolerant Platform for Mobile Agent Systems International Journal of Security and Its Applications Vol. 9, No. 5,ISSN: 1738-9984 IJSIA ,2015
[10] A.K. Sharma, Atul Mishra, Vijay Singh An Intelligent Mobile-Agent Based Scalable Network Management Architecture for Large-Scale Enterprise System International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.1, January 2012