Mobile Agent based Security Enhancements in Ad Hoc Grid Environment

被引:0
作者
Jeyakumar, K. [1 ]
Nithya, L. M. [1 ]
机构
[1] SNS Coll Technol, Dept Informat Technol, Coimbatore, Tamil Nadu, India
来源
2012 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC) | 2012年
关键词
Ad Hoc Grid; RETENTION; Grid Security; Mobile Agents Security; Multi Agent Multi Key Environment; FRAMEWORK;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The mobile agent paradigm and security issues in the grid has been successfully used in large number of research areas separately, and specifically contributes to the research endeavors. The proposed paper combines both the technologies and provides avenues for further research. Particularly in ad hoc grid environment, resources are not always available as the nodes can spontaneously connect and disconnect at any time. Thus, these environments demand the correct execution of process for improving the performance criteria. However, there are some intruders that affect the normal operation of ad hoc grids. Therefore, it is essential to use punishment procedures based on trust models. The existing work has proven that the RETENTION a reactive trust based mechanism detected and punished malicious nodes in ad hoc grid environments, without generating any false-positives. We propose a mobile agent based trust model in ad hoc grid environment for improving the performance considerations and security issues. Simulation results demonstrate the effectiveness of the proposed work, to detect and punish nodes having malicious behavior, such as selfish nodes, injected nodes and so on. We observe that the behavior of the proposed model is comparatively good in a scenario where the types of attack implemented in different nodes.
引用
收藏
页数:5
相关论文
共 16 条
[1]  
Bellifemine Fabio, WILEY SERIES AGENT T
[2]  
Braga Reinaldo B., 2012, J NETWORK COMPUTER A
[3]  
CARBONE M, 2003, INT C SOFTW ENG FORM
[4]  
Casanova Henri, SIMGRID TOOLKIT SIMU
[5]   Security in grid computing: A review and synthesis [J].
Cody, Erin ;
Sharman, Raj ;
Rao, Raghav H. ;
Upadhyaya, Shambhu .
DECISION SUPPORT SYSTEMS, 2008, 44 (04) :749-764
[6]  
Dinesh S, 2011, IJCA COMPUTATIONAL S, V4, P140
[7]  
DORNEMANN T, 2008, SECURE GRID MICROWOR, P119, DOI DOI 10.1109/SEAA.2008.70
[8]  
Fatih Turkmen B C., 2008, SWS '08 Proceedings of the 2008 ACM workshop on Secure web services, P37
[9]  
Foster I, 2003, GRID 2 BLUEPRINT NEW
[10]  
Haugeneder H, 1995, P AG SOFTW SEM LOND, P80