Data Security in Free Roaming Mobile Agents

Mobile agents are software programs that live in computer networks, performing their computations and moving from host to host as necessary to fulfill their goals. Mobile agents are especially useful in electronic commerce, for both wired and wireless environments. In this research work, both chain relation and TTP(trusted host) has used for protecting data of free roaming mobile agents which is called Trusted host by Knowledge Based System(TKBS). Using Knowledge based system, trusted host list is maintained. In trusted Host agent may not clone. By using chain relation with trusted host, redundancy will be reduced and efficiency will be improved.

[1]  Lein Harn,et al.  An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[2]  Ed Dawson,et al.  An Improved Forward Integrity Protocol for Mobile Agents , 2003, WISA.

[3]  Cornelia Boldyreff,et al.  Mobile agent fault tolerance for information retrieval applications: an exception handling approach , 2003, The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003..

[4]  Wolfgang Faber,et al.  Plan reversals for recovery in execution monitoring , 2004, NMR.

[5]  Zizette Boufaïda,et al.  TAMAP: a new trust-based approach for mobile agent protection , 2007, Journal in Computer Virology.

[6]  Ralph Deters,et al.  Improving fault-tolerance by replicating agents , 2002, AAMAS '02.

[7]  Radu Popescu-Zeletin,et al.  Mobile Agent-Based Transaction in Open Environments , 2000 .

[8]  A. Unruh,et al.  Semantic-compensation-based recovery in multi-agent systems , 2005, IEEE 2nd Symposium on Multi-Agent Security and Survivability, 2005..

[9]  Zhengyou Xia,et al.  Defend mobile agent against malicious hosts in migration itineraries , 2004, Microprocess. Microsystems.

[10]  Shane Balfe,et al.  Mobile Agents and the Deus Ex Machina , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[11]  Wang Feng-rui Differential evolution algorithm for location management problem of mobile computing , 2008 .

[12]  Ichiro Satoh Mobile Agent Technology , 2001 .

[13]  Karen L. Myers,et al.  The SPARK agent framework , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[14]  Pádraig Cunningham,et al.  Software agents: A review , 1997 .