Abstract
A Mobile agents are combination of software programs which works automatically in homogeneous and non-homogeneous environment from one host to another for sharing information among users. Mobile agents migrate in unsecure network, so mobile agent’s security is a major concern during the communication and sharing of data & information. Mobile agent’s migration has major security issues i.e. data integrity, data confidentiality & authentication, on-repudiation, denial of service and access control. In this paper neural network based synchronization key exchange is proposed for Encryption and Decryption.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ahila, S.S., Shunmuganathan, K.L.: Overview of mobile agent security issues. In: International Conference on Information Communication and Embedded Systems, pp. 1–6. S. A. Engineering College, Chennai (2014)
Dhingra, S., Savalgi, A.A., Jain, S.: Laplace transformation based cryptographic technique in network security. Int. J. Comput. Appl. 136(7), 6–10 (2016)
Wayne, J., Tom, K.: NIST Special Publication 800-19–Mobile Agent Security, pp. 1–52. National Institute of Standards and Technology, Computer Security Division, Gaithersburg (1999)
Karim, M.R.: Security for mobile agents and platforms: securing the code and protecting its integrity. J. Inf. Technol. Softw. Eng. 8, 1–3 (2018)
Kumar, P., Vatsa, A.K.: Novel security architecture and mechanism for identity based information retrieval system in MANET. Int. J. Mob. Adhoc Netw. 1(3), 397–404 (2011)
Amit, M., Anamika, C.: Mobile agent: security issues and solution. Int. J. Comput. Technol. Electron. Eng. 2(6), 30–32 (2012)
Vogler, H., Kunkelmann, T., Moschgath, M.L.: An approach for mobile agent security and fault tolerance using distributed transactions. In: Proceeding of the 1997 International Conference on Parallel and Distributed Systems, Germany, pp. 268–274 (1997)
Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225–6232 (2010)
Chadha, Z., Hela, H., Khaled, G.: Security during communication in mobile agents system. Proc. Comput. Sci. 60, 17–26 (2015)
Martínez Padilla, J., Meyer-Baese, U., Foo, S.: Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions. EURASIP J. Inf. Secur. 2018(1), 1–16 (2018). https://doi.org/10.1186/s13635-018-0073-z
Singhal, N., Dixit, A., Agarwal, R.P., Sharma, A.K.: Need of securing migrating crawling agent, remote platform and the data collection. Int. J. Electron. Comput. Sci. Eng. 2(1), 39–45 (2012)
Singhal, N., Dixit, A., Agarwal, R.P., Sharma, A.K.: A reliability based approach for securing migrating crawlers. Int. J. Inf. Technol. 10(1), 91–98 (2017). https://doi.org/10.1007/s41870-017-0065-0
Alves-Foss, Harrison: The use of encrypted functions for mobile agent security. In: Proceedings of the 37th Hawaii International Conference on System Sciences, pp. 1–10 (2004)
Mukherjee, A., Deng, H., Agrawal, D.P.: Distributed pair wise key generation using shared polynomials for wireless ad hoc networks. In: Belding-Royer, E.M., Al Agha, K., Pujolle, G. (eds.) MWCN 2004. IFIPAICT, vol. 162, pp. 215–226. Springer, Boston (2005). https://doi.org/10.1007/0-387-23150-1_19
Homood, K.: Lagrange interpolation for mobile agent connection encryption. Ibn Al-Haitham J. Pure Appl. Sci., 1–12 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, P., Singhal, N., Chaitra, K.M. (2020). Securing Mobile Agents Migration Using Tree Parity Machine with New Tiny Encryption Algorithm. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T., Valentino, G. (eds) Advances in Computing and Data Sciences. ICACDS 2020. Communications in Computer and Information Science, vol 1244. Springer, Singapore. https://doi.org/10.1007/978-981-15-6634-9_13
Download citation
DOI: https://doi.org/10.1007/978-981-15-6634-9_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-6633-2
Online ISBN: 978-981-15-6634-9
eBook Packages: Computer ScienceComputer Science (R0)