Analysis of Secure Mobile Agent System
Rajesh Shrivastava1, Pooja Mehta (Gahoi)2

1Rejesh Shrivastava, Head, Department of Computer Science, Shri Ram Institute of Engg. and Tech., Jabalpur, India.
2Pooja Mehta (Gahoi), Deptt. of Computer Science, Shri Ram Institute of Engg. and Tech., Jabalpur, India.

Manuscript received on February 15, 2012. | Revised Manuscript received on February 20, 2012. | Manuscript published on March 05, 2012. | PP: 272-274| Volume-2 Issue-1, March 2012. | Retrieval Number: A0433022112/2012©BEIESP
Open Access | Ethics and Policies | Cite 
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As a recently emerging distributed computing paradigm, mobile-agent technology attracts great interests because of its salient merits. However, it also brings significant security concerns, among which the security problems between a mobile agent and its platforms are of primary importance. While protecting a platform (platform or host security) can benefit from the security measures in a traditional client-server system, protecting a mobile agent (mobile-agent or code security) has not been met in traditional client-server systems and is a new area emerging with mobile-agent technology. We analyzed the different types of security issues related to mobile agent. After analysis, we found that there are many kind of technology available to ensure mobile agent security. But not a single technology provides complete solution for the same. We proposed an algorithm in which we use monitoring agent and dummy agent in place of original mobile agent. Monitoring agent checks the behavior of next node in the network. If monitoring agent finds the node suspicious, it sends the alert acknowledgment to original agent and original agent doesn’t travel to that suspicious node.

Keywords: Mobile agent, distributed systems, security.