Abstract

Mobile agent is gaining attention in the research community because of its potential to replace traditional client-Server application in computer network system. Mobile agent has the ability to migrate autonomously from one server to another server as specified in its itinerary in computer network. Areas where mobile agent profit includes network management, information retrieval and electronic commerce. Mobile agent can be delegated to carry out all stages that are involved in electronic commerce such as Product brokering, Merchant brokering, Negotiation and Purchase. However there are security vulnerability issues with mobile agent system such as the need to ensure confidentiality of information of the agent from malicious parties, integrity of the data of the agent and non-repudiation from parties involves in the transactions. Security measure by agent developers has been mobile cryptography. This research combines Elliptic curve cryptography (ECC) and Steganography known as crypto-steganography to secure its agent. The agent was developed using PHP 5.0, Javascript, HTML, Wampserver and MySQL. The system was tested on a local area network with six computer systems, one of the computers represent client and the other five as servers. Performance evaluation was carried out to test for execution time and workload effect on the system. The result was compared with the existing secured agent-based electronic commerce systems in term of response time. The result shows that the proposed security is faster than RSA but a little slower than ECC only. A trade off was observed between a more secured system and response time of the system.

Highlights

  • Mobile agents are programs bundled with data and execution state that can suspend execution, migrate to other computers connected over a network, and resume execution there (Bradshaw, 1997)

  • Certain security threats that are possible to a mobile agent executing on a remote host in electronic commerce were mentioned in Dave and Bart, (2004)

  • Average Execution Time (AET) = (E1+E2)/2 for a number of items selected for each server is shown in the Table 3 Table 3 Average Execution Time for a number of items selected on each server

Read more

Summary

Security Issues in Mobile Agent-Based

Certain security threats that are possible to a mobile agent executing on a remote host in electronic commerce were mentioned in Dave and Bart, (2004). A malicious host could try to steal the private key of the mobile agents. If it succeeds, it can sign arbitrary document and probably get credit card information. The easiest one for a malicious host is is not to execute the mobile code This can be resolved using multiple agents. After successful log-in, the user is allowed to select agent into network for shopping process as show in items of his choice. In this page, a single item is Figure 3.

Experimental Results and Discussion
Evaluation with the Existing
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.