Abstract

The area of mobile agent security is in a state of immaturity, but rapidly improving. Emphasis is begi nning to move toward developing techniques that are oriented towards protecting the agent. Agent technology has been used in many crit ical applications like business process management, e-commerce, artificial intellig ence, distributed processing etc. The mobile agent technology has encountered many security threats during the itinerary period .security schemes presented in this paper for mo bile agent address the code, data and itinerary security issues. An environment that protects the legitimate mobile agent from the malicious mobile agent is provided. A checksum method is used to detect a mal icious mobile agent which is appending to a legitim ate mobile agent. The confidentiality of the data that are retrieved from each remote server is ensured by encryption mechan isms. The itinerary is also protected by allowing only registered users to crea te new mobile agents and is controlled by a central co-coordinator. Thus an enhanced security mechanism is presented to protect the mobile agent’s code, data and route.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call