Skip to main content

Securing Mobile Agents Migration Using Tree Parity Machine with New Tiny Encryption Algorithm

  • Conference paper
  • First Online:
  • 1226 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1244))

Abstract

A Mobile agents are combination of software programs which works automatically in homogeneous and non-homogeneous environment from one host to another for sharing information among users. Mobile agents migrate in unsecure network, so mobile agent’s security is a major concern during the communication and sharing of data & information. Mobile agent’s migration has major security issues i.e. data integrity, data confidentiality & authentication, on-repudiation, denial of service and access control. In this paper neural network based synchronization key exchange is proposed for Encryption and Decryption.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Ahila, S.S., Shunmuganathan, K.L.: Overview of mobile agent security issues. In: International Conference on Information Communication and Embedded Systems, pp. 1–6. S. A. Engineering College, Chennai (2014)

    Google Scholar 

  • Dhingra, S., Savalgi, A.A., Jain, S.: Laplace transformation based cryptographic technique in network security. Int. J. Comput. Appl. 136(7), 6–10 (2016)

    Google Scholar 

  • Wayne, J., Tom, K.: NIST Special Publication 800-19–Mobile Agent Security, pp. 1–52. National Institute of Standards and Technology, Computer Security Division, Gaithersburg (1999)

    Google Scholar 

  • Karim, M.R.: Security for mobile agents and platforms: securing the code and protecting its integrity. J. Inf. Technol. Softw. Eng. 8, 1–3 (2018)

    MathSciNet  Google Scholar 

  • Kumar, P., Vatsa, A.K.: Novel security architecture and mechanism for identity based information retrieval system in MANET. Int. J. Mob. Adhoc Netw. 1(3), 397–404 (2011)

    Google Scholar 

  • Amit, M., Anamika, C.: Mobile agent: security issues and solution. Int. J. Comput. Technol. Electron. Eng. 2(6), 30–32 (2012)

    Google Scholar 

  • Vogler, H., Kunkelmann, T., Moschgath, M.L.: An approach for mobile agent security and fault tolerance using distributed transactions. In: Proceeding of the 1997 International Conference on Parallel and Distributed Systems, Germany, pp. 268–274 (1997)

    Google Scholar 

  • Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225–6232 (2010)

    Article  Google Scholar 

  • Chadha, Z., Hela, H., Khaled, G.: Security during communication in mobile agents system. Proc. Comput. Sci. 60, 17–26 (2015)

    Article  Google Scholar 

  • Martínez Padilla, J., Meyer-Baese, U., Foo, S.: Security evaluation of Tree Parity Re-keying Machine implementations utilizing side-channel emissions. EURASIP J. Inf. Secur. 2018(1), 1–16 (2018). https://doi.org/10.1186/s13635-018-0073-z

    Article  Google Scholar 

  • Singhal, N., Dixit, A., Agarwal, R.P., Sharma, A.K.: Need of securing migrating crawling agent, remote platform and the data collection. Int. J. Electron. Comput. Sci. Eng. 2(1), 39–45 (2012)

    Google Scholar 

  • Singhal, N., Dixit, A., Agarwal, R.P., Sharma, A.K.: A reliability based approach for securing migrating crawlers. Int. J. Inf. Technol. 10(1), 91–98 (2017). https://doi.org/10.1007/s41870-017-0065-0

    Article  Google Scholar 

  • Alves-Foss, Harrison: The use of encrypted functions for mobile agent security. In: Proceedings of the 37th Hawaii International Conference on System Sciences, pp. 1–10 (2004)

    Google Scholar 

  • Mukherjee, A., Deng, H., Agrawal, D.P.: Distributed pair wise key generation using shared polynomials for wireless ad hoc networks. In: Belding-Royer, E.M., Al Agha, K., Pujolle, G. (eds.) MWCN 2004. IFIPAICT, vol. 162, pp. 215–226. Springer, Boston (2005). https://doi.org/10.1007/0-387-23150-1_19

  • Homood, K.: Lagrange interpolation for mobile agent connection encryption. Ibn Al-Haitham J. Pure Appl. Sci., 1–12 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pradeep Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, P., Singhal, N., Chaitra, K.M. (2020). Securing Mobile Agents Migration Using Tree Parity Machine with New Tiny Encryption Algorithm. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T., Valentino, G. (eds) Advances in Computing and Data Sciences. ICACDS 2020. Communications in Computer and Information Science, vol 1244. Springer, Singapore. https://doi.org/10.1007/978-981-15-6634-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-6634-9_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-6633-2

  • Online ISBN: 978-981-15-6634-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics