Abstract

A mobile agent is a self-learning machine entity that uses the system infrastructure to keep running in another remote zone, check and compile the results, interact with various locations and return to his home site after completing the relegated activities. Mobile Agent-based solutions for the testing community have grown in popularity and are now used in a variety of fields, including boardroom management, electronic commerce, renewable energy and power management. Addition to these applications, Broadband Interactive Sensors, network performance improvement, disseminated knowledge mining, multimedia, human monitoring, surveillance, affective computing, weather and environment, e-learning and semantic web administrations are only a few of the topics covered. In an extremely non trusty environment, focus should be taken to shield the portable operator from acquiring altered. Existing works on mobile agent frameworks with very surprising instruments does not offer complete security. In this paper a capture based trust dependence framework is proposed for identification of authorized or trust nodes inside mobile agents systems. Here we consider the mobile adhoc networks for computational analysis of network performance using network simulator. The framework provides efficient results in identification of authorized nodes.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.