Implementation of Trust and Reputation Management for Free-Roaming Mobile Agent Security

Mobile agent (MA) technology plays an important role in today's e-world. MA is a program that consists of code and data that move from one host to another host and performs a task on behalf of the user. MA protection becomes essential when it migrates to the remote hosts in a network. Here, trust and reputation management (TRM) is implemented to provide a secure path for free-roaming MA data protection. TRM utilizes a trust-based routing table that is constructed with a trust and reputation value. Various types of attacks, particularly colluded truncation attacks, are avoided by secure routing. Cryptographic algorithms are used to ensure properties such as confidentiality, integrity, etc. Thus, the free-roaming MA retrieves information from various remote hosts in a secure and efficient manner.

[1]  C. Chellappan,et al.  Identifying the split personality of the malicious host in the mobile agent environment , 2008, 2008 4th International IEEE Conference Intelligent Systems.

[2]  Zhiping Jia,et al.  Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..

[3]  Junmo Xiao,et al.  A novel free-roaming mobile agent security protocol against colluded truncation attacks , 2008, 2008 International Conference on Information and Automation.

[4]  Amitava Datta,et al.  Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.

[5]  Winston K. G. Seah,et al.  Routing security and data confidentiality for mobile ad hoc networks , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..

[6]  Ed Dawson,et al.  An Improved Forward Integrity Protocol for Mobile Agents , 2003, WISA.

[7]  Suphithat Songsiri A new approach for computation result protection in the mobile agent paradigm , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).

[8]  C. Chellappan,et al.  Generating routing table for free roaming mobile agent in distributed environment , 2009, Comput. Stand. Interfaces.

[9]  C. Chellappan,et al.  Free-roaming mobile agent (FRoMA) protection against multiple attacks , 2009 .

[10]  Rui Zhang,et al.  A Novel Security Protocol to Protect Mobile Agent against Colluded Truncation Attack by Cooperation , 2008, 2008 International Conference on Cyberworlds.

[11]  Liu Jun,et al.  A Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attack without trusted third party , 2010, 2011 International Conference on Business Management and Electronic Information.

[12]  Dong-Ik Lee,et al.  Data protection in mobile agents; one-time key based approach , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.

[13]  Zizette Boufaida,et al.  Dynamic Adaptability Using Reflexivity for Mobile Agent Protection , 2008 .

[14]  Samuel Pierre,et al.  Protection of a mobile agent with a reference clone , 2006, Comput. Commun..

[15]  T. Purusothaman,et al.  AFDB security protocol against colluded truncation attack in free roaming mobile agent environment , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[16]  Behrouz Tork Ladani,et al.  Anonymity and security for autonomous mobile agents , 2010, IET Inf. Secur..

[17]  Victor K.-W. Wei,et al.  Defenses against the Truncation of Computation Results of Free-Roaming Agents , 2002, ICICS.

[18]  C. Chellappan,et al.  Protecting free-roaming mobile agent against multiple colluded truncation attacks , 2007, MobiMedia.

[19]  N. Asokan,et al.  Protecting the computation results of free-roaming agents , 2005, Personal Technologies.

[20]  Yu-Fang Chung,et al.  Efficient migration access control for mobile agents , 2009, Comput. Stand. Interfaces.

[21]  Volker Roth,et al.  On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection , 2001, Mobile Agents.

[22]  Xiaogang Wang,et al.  A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards , 2008, ATC.

[23]  Anand R. Tripathi,et al.  Security in the Ajanta mobile agent system , 2001, Softw. Pract. Exp..

[24]  G. Geetha,et al.  Data Security in Free Roaming Mobile Agents , 2011 .

[25]  C. Jayakumar,et al.  PROTECTION OF FREE ROAMING MOBILE AGENTS USING CUSTOMIZED ROOT CANAL ALGORITHM AGAINST MALICIOUS HOST ATTACKS , 2014 .

[26]  G. Geetha,et al.  Trust Enhanced Data Security in Free Roaming Mobile agents Using Symmetric Key cryptography , 2011 .

[27]  Bennet S. Yee A Sanctuary for Mobile Agents , 2001, Secure Internet Programming.

[28]  Xiaofei Wang,et al.  Multiple mobile agents' itinerary planning in wireless sensor networks: survey and evaluation , 2011, IET Commun..

[29]  Lein Harn,et al.  An Improved Free-Roaming Mobile Agent Security Protocol against Colluded Truncation Attacks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[30]  M. J. Zemerly,et al.  Distributed lightweight Kerberos protocol for Mobile Agent Systems , 2011, 2011 IEEE GCC Conference and Exhibition (GCC).

[31]  Mahesh Chandra Govil,et al.  Security Issues in Mobile Agents , 2010 .