Incorporating novel hierarchical secure model for performance and reliability evaluation in mobile agent system

被引:0
作者
Mishra, Prashant Kumar [1 ]
Singh, Raghuraj [2 ]
Yadav, Vibhash [3 ]
机构
[1] PSIT Coll Engn, Comp Sci & Engn Dept, Kanpur, Uttar Pradesh, India
[2] Harcourt Butler Tech Univ, Comp Sci & Engn Dept, Kanpur, Uttar Pradesh, India
[3] Rajkiya Engn Coll, Dept Informat Technol, Banda, India
关键词
mobile agent system; MAS; mobile agents; host systems; reliability model; reliability estimation; INTRUSIONS;
D O I
10.1504/IJCNDS.2019.098871
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Emerging mobile agent paradigm supports towards wider applications of mobile agent system (MAS). To guarantee security challenges due to several vulnerable threats into MAS, reliability issues are addressed. In this paper, a hierarchical secure model is designed for reliability prediction of MAS. The proposed security model is categorised as: host security, agent security and communication channel security. Security improvising effects over the reliability enhancements, security is maintained in mobile agent, host and during mobile agent migration. A novel multi-factor authentication is used at mobile agent verification; hosts are verified with respect to the certificate originality and pseudo identity. Opinions from neighbouring host are requested for secure migration of mobile agent. Security-based challenges solved in this paper shows enhancements in reliability of MAS that is estimated in terms of confidentiality, authentication at origin, integrity of agent, quality of mobile agent, security, fault tolerance, dynamic topology and link connectivity. Our proposed MAS are designed in NS3 simulator that results reliability enhancement according to number of mobile agents, size of MAS and number of hosts.
引用
收藏
页码:294 / 312
页数:19
相关论文
共 44 条
[1]  
Ahila S. S., 2014, INT C INF COMM EMB S, P1
[2]  
Al-Anni M. K., 2017, INT J COMPUT INF SCI, V11, P801
[3]  
Anil A., 2014, INT J RES ENG TECHNO, V3, P16
[4]  
[Anonymous], 2016, CIRCUITS SYSTEMS
[5]   A new trust-based mechanism for detecting intrusions in MANET [J].
Anusha K. ;
Sathiyamoorthy E. .
Information Security Journal, 2017, 26 (04) :153-165
[6]  
Bagga P., 2017, J ACM COMPUTING SURV, V50, P1
[7]  
Budhkar S., 2012, Proceedings of the 2012 1st International Conference on Recent Advances in Information Technology (RAIT 2012), P124, DOI 10.1109/RAIT.2012.6194492
[8]  
Chowdhury C., 2011, Proceedings of the 2011 World Congress on Information and Communication Technologies (WICT), P990, DOI 10.1109/WICT.2011.6141383
[9]  
Chowdhury Chandreyee, 2010, Proceedings of the Third International Conference on Dependability (DEPEND 2010), P45, DOI 10.1109/DEPEND.2010.15
[10]  
Chowdhury C., 2011, INT J ADV NETWORKS S, V4, P55