Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30184
Security of Mobile Agent in Ad hoc Network using Threshold Cryptography

Authors: S.M. Sarwarul Islam Rizvi, Zinat Sultana, Bo Sun, Md. Washiqul Islam

Abstract:

In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security. Security services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network.

Keywords: Ad hoc network, Mobile Agent, Security, Threats, Threshold Cryptography.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1059883

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1534

References:


[1] Wikipedia the free encyclopedia. Ad hoc. (Online) (Updated 1 March 2010) Available at: http://en.wikipedia.org/wiki/Ad_hoc (Accessed 3 March 2010).
[2] SearchMobileComputing.com Definitions. ad-hoc network. (Online) (Updated 5 Dec 2000) Available at: http://searchmobile computing .techtarget.com/definition/ad-hoc-network
[Accessed 3 March 2010].
[3] Wikipedia the free encyclopedia. Mobile agent. (Online) (Updated 1 March 2010) Available at: http://en.wikipedia.org/wiki/Mobile _agent (Accessed 3 March 2010).
[4] Lidong Zhou, Zygmunt Haas, 1999. Securing Ad Hoc Networks.
[Online] Cornell University Ithaca, NY, USA. Available at: http://www.cs.cornell.edu/home/ldzhou/adhoc.pdf (Accessed 2 March 2010).
[5] Tarig Mohammad Ahmed, 2009. Using Secure-Image Mechanism to Protect Mobile Agent against malicious Hosts. (Online) World Academy of Science, Engineering and Technology. Available at: http://www.waset.org/journals/waset/v59/v59-82.pdf (Accessed 2 March 2010).
[6] Niklas Borselius, Mobile agent security. (Online) Information Security Group, Royal Holloway, University of London. Available at: http://www.agent.ai/doc/upload/200402/bors02_1.pdf (Accessed 1 March 2, 2010).
[7] Mieso K. Denko and Qusay H. Mahmoud, Mobile Agents for Clustering and Routing in Mobile Ad Hoc Networks, In : S. Pieere, M. Barbeau, E. Kranakis, Eds. 2nd International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW-03), 8-10 oct. 2003, Montreal, Canada, Springer, 2003, pp. 271-276.
[8] ZHANG Yi, ZHU Lina and FENG Li, 2009. Key Management and Authentication in Ad Hoc Network based on Mobile Agent (Online) JOURNAL OF NETWORKS, VOL. 4, NO. 6, AUGUST 2009 Available at: http://www.academypublisher com/ ojs/index. php/jnw/article/viewFile/0406487494/817 (Accessed 2 March 2010).
[9] Dale, J. and DeRoure, D. C. (1997) A Mobile Agent Architecture for Distributed Information Management. In: Proceedings of the International Workshop on the Virtual Multicomputer. 1997.
[10] David Kotz and Robert S. Gray, 1999. Mobile Agents and the Future of the Internet. (Online) Available at: http://www.cs .dartmouth.edu/~dfk/papers/kotz:future2/ (Accessed 2 March 2010).
[11] Wayne Jansen, Tom Karygiannis, NIST Special Publication 800-19 - Mobile Agent Security. (Online) National Institute of Standards and Technology. Available at: http://csrc.nist.gov/ publications/nistpubs/800-19/sp800-19.pdf (Accessed 1 March 2010).
[12] The University of Birmingham, 2004. Symmetric-key cryptography.
[Online] Available at: http://www.cs.bham.ac. uk/~mdr/ teaching/modules04/security /lectures/symmetric-key.html (Accessed 2 March 2010).
[13] Sun Microsystems Documentation. Introduction to Public-Key Cryptography. (Online) (Updated 10 September 1998) Available at: http://docs.sun.com/source/816-6154-10/contents.htm (Accessed 1 March 2010).
[14] Giovanni Vigna, 1997. Protecting Mobile Agents through Tracing
[Online] Research Publication Repository of KFUPM (King Fahd University of Petroleum & Minerals) Available at: https://eprints.kfupm.edu.sa/59734/1/59734.pdf (Accessed 2 March 2010).
[15] B. S. Yee, A Sanctuary for Mobile Agents, In: Secure Internet Programming, pp 261-273, 1999.
[16] YANG Ya-tao, ZENG Ping, FANG Yong, CHI Ya-Ping, 2007. A Feasible Key Management Scheme in Ad hoc Network. (Online) IEEE. Available at: http://ieeexplore.ieee.org/stamp/stamp.jsp ?arnumber=04287521 (Accessed 6 March 2010).