Using Secure-Image Mechanism To Protect Mobile Agent Against Malicious Hosts

The usage of internet is rapidly increasing and the usage of mobile agent technology in internet environment has a great demand. The security issue one of main obstacles that restrict the mobile agent technology to spread. This paper proposes Secure-Image Mechanism (SIM) as a new mechanism to protec...

Full description

Bibliographic Details
Main Author: Tarig Mohamed Ahmed
Format: Text
Language:English
Published: Zenodo 2009
Subjects:
Tay
Online Access:https://dx.doi.org/10.5281/zenodo.1057605
https://zenodo.org/record/1057605
Description
Summary:The usage of internet is rapidly increasing and the usage of mobile agent technology in internet environment has a great demand. The security issue one of main obstacles that restrict the mobile agent technology to spread. This paper proposes Secure-Image Mechanism (SIM) as a new mechanism to protect mobile agents against malicious hosts. . SIM aims to protect mobile agent by using the symmetric encryption and hash function in cryptography science. This mechanism can prevent the eavesdropping and alteration attacks. It assists the mobile agents to continue their journey normally incase attacks occurred. : {"references": ["G. Karjoth, N. Asokan, C. Gulcu , Protecting the Computation\nresult of Free-roaming Agents, Proceedings of Second\nInternational Workshop, Mobile Agent 98. Verlage Lecture Notes\nin Computer Science, Vol. 1477, PP 195-207, 1998.", "Karnik, Neeran, Security in Mobile Agent Systems, Ph.D.\ndissertation. Department of Computer Science and Engineering,\nUniversity of Minnesota, 1998", "B.H. Tay, A. Ananda, A Survey of Remote Procedure Calls,\nOperating system Review, 24(3), PP 63-79, July 1990.", "R. S. Gary, Agent Tcl: A flexible an Secure Mobile Agent System,\nFourth Annual Tcl/Tk Workshop (TCL 96) ( Monterey,\nCalifornia, July 1996), M Diekhans and M Roseman, editors, July\n1996.", "G. Karjoth, D. B. Lang, Oshima, A Security Model for Aglet.\nIEEE Internet Computing , 1(4) , 1997.", "M. Giansiracusa, Mobile Agent Protection Mechanisms, and the\nTrusted Agent Proxy Server (TAPS). Information Security\nResearch Center, Australia, 2003.", "W. Jansen, T. Karygiannis, NIST Special Publication 800-19-\nMobile Agent Security, Technical paper , National Institute of\nStandards and Technology, Computer Security Division.", "J.M. Cueva Lovelle et al. (Eds.): ICWE 2003, LNCS 2722, pp.\n289-292, Springer-Verlag Berlin Heidelberg 2003", "Leila Ismail, A Secure Mobile Agents Platform, JOURNAL OF\nCOMMUNICATIONS, VOL. 3, NO. 2, 2008\n[10] TACOMA. University of Tromso, july 1999.\nhttp://www.tacoma.cs.uit.no/.\n[11] G. Vigna, Cryptography Traces for Mobile Agents, In G. Vigna ,\neditor, Mobile Agent and Security, volume 1419, 1998.\n[12] A. Suen, Mobile Agent Protection with Data Encapsulation and\nExecution Tracing, Master Thesis, The Florid State University,\n2003.\n[13] F. Hohl, Time Limited Blackbox Security: Protection Mobile\nAgent From Malicious Hosts, In G. Vigna , editor, Mobile Agent\nand Security , PP 92-113 ,1998.\n[14] T. Sander , C. F. Tschudin , Protecting Mobile Agent Against\nMalicious Hosts,In G. Vigna , editor, Mobile Agent and Security,\nVol. 1419, 1998.\n[15] Anand Tripathi, Neeran Karnik, A Security Architecture for\nMobile Agents in Ajanta, Proceedings of the International\nConference on Distributed Computing Systems, April 2000.\n[16] B. S. Yee, A Sanctuary for Mobile Agents, In Secure Internet\nProgramming, PP 261-273, 1999.\n[17] J. Riordan and B. Schneier, Environment Key Generation Toward\nClueless Agents, Technical Report, 1998.\n[18] Hock Kim Tan and L. Moreau, Mobile Code For Key\nPropagation, Paper, Notes in theoretical Computer Science 63,\nUK, 2001.\n[19] G. Paramasivam, Cryptography in Microsoft.NET Part I:\nEncryption, technical paper,\n[20] G. Paramasivam,Cryptography in Microsoft.NET Part II: Digital\nEnvelop and Digital Signatures, technical paper, http://www.csharpcorner.\ncom/Code/2002/Dec/DigitalEnvelop.asp,2002."]}