Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Mobile Agent Synchronization And Security Issue Seminar Report
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Mobile Agent Synchronization And Security Issue


[attachment=68464]


Abstract


Mobile Agent Systems is a new expertise it was
developed for the communication between different
mobile devices they have some good features but
security remains the major problem in all Mobile
Agent Systems for research point of view. In mobile
based Communication System, there were many
problems in network like low bandwidth, slow data
rate, data are not secure (because signals being
available in open). The subject communication runs
into cyber security problems. Our main objective is
to provide a highly secure environment that is
simple to use and deploy. Software security to
protect mobile agent consists of lots of aspects like
cryptography, access control and trust
management, intrusion detection and tamper
resistance, authentication and privacy, signature
schemes, e-commerce, security analysis, mobile
computing security etc. So, to design and develop
system to synchronize two or more mobile using
mobile agent and JADE platform for monitoring the
flow of information and execution of a running
mobile agent in a secure environment.


Introduction


The mobile agent paradigm is a further extension to
distributed computing paradigms. A mobile agent is a
software piece of program with mobility which can be
sent out from a computer into a network and roam
among the computer nodes in the network [28]. It can
be executed on those computers to finish its task on
behalf of its owner. The transferring of a mobile agent
state facilitates it in working automatically to travel
between one or more remote computer. The key
characteristic of the mobile agent paradigm is that any
host in the network is allowed a high degree of
flexibility to possess any mixture of know-how,
resources and processors. Its processing capabilities can
be combined with local resources [4]. Know- how (in
the form of mobile agent) is available throughout the
network. Since, the mobile agent has many salient
merits, so it has attracted tremendous attention in last



Introduction to Mobile Agent


Mobile agent is a new expertise that makes it much
easier to design, implement and maintain spread
system. Mobile agents are able to diminish network
traffic load and supports functions to beat network
latency. To satisfy the user need Mobile agent can
implement highly robust and fault-tolerant system


Proposed Work

In this project, we look into the general issues in
mobile agent security, paying special attention to the
problem of synchronization and monitoring the flow of
information and execution of a running mobile agent. A
classification of threats is given and some suggested
solutions are examined in detail. Then, we discuss the
various security issues that arise in „data collection
agents‟ – agents which visit various hosts to collect
data from them. In particular to synchronize two or
more mobile agent and to detect the flow of
information between two or more mobile agent on
JADE platform.



SECURITY ISSUES IN MOBILE AGENTS

4.1 Attacks on Mobile Agents by Mobile
Agent Platforms
In case of strong mobility of mobile agent all its code,
data and state are exposed to the mobile agent platform
in which it migrates for execution of operation.
Because of this mobile agent faces more severe security
risks. Following are possible attacks by malicious
platforms [29]:



Security Requirements to protect Mobile Agents

4.2.1 Authentication and Authorization
Authentication of a entity is the process of verifying the
identity or other relevant information about the entity.
The outcome of the authentication processes is that the
user/agent knows the identity of the server/agent
execution environment and the server/agent execution
environment knows the identity of the user/agent. The
process of deciding whether or not to grant a request



Conclusion

For mobile code computing and to realize its full
potential as the software infrastructure of truly
distributed computing, we must understand and
develop security mechanisms that both detect and
prevent malicious attacks against mobile code
program[27]. All security mechanisms discussed
are effective to some degree and the use of them
should be retained. But most of the security
measures are not adequate because they are not
geared towards software i.e. mobile, works
cooperatively, interacts with its own environment
and reacts unpredictly to unexpected events like
software flaws, human errors etc.