Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Rescuing data of mobile agents blocked by malicious hosts in e-service applications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Singh, R. ; Dept. of CE, NIT, Kurukshetra, India ; Dave, M.

Mobile agents are software programs that may move from host to host as necessary to carry out their functions. Such systems violate some of the assumptions that underlie most existing computer security implementations. Full-scale adoption of mobile agent technology in untrustworthy network environment, such as Internet, has been delayed due to several complexities. Problem of Malicious Host (POMH) (i.e. how to protect agents against the malicious hosts) is a serious security problem in mobile agent system. The protection of mobile agents against the attacks of malicious hosts is considered a very challenging security problem. It has inspired lot of research interest, but very few measures exist to counter blocking attack where a host with malicious intentions refuses to transmit a mobile agent to the next host. It is significant and important requirement of the agent owner to rescue the data collected by the agent under custody and redeem a loss. In this paper, we present our scheme that aims to rescue the results being carried by blocked agent. The significant contribution of the scheme is the real time applicability in mobile agent based applications and maximum reduction of data loss in case of blocking attacks.

Published in:

Multimedia, Signal Processing and Communication Technologies (IMPACT), 2011 International Conference on

Date of Conference:

17-19 Dec. 2011