Author : Maitanmi O. Stephen 1
Date of Publication :19th October 2021
Abstract: Mobile agent technology offers a new computing paradigm in which a program in the form of a software agent can transfer its execution from agent. This agent masquerading itself as the original source of message. The use of mobile code has a long history dating back to the use of remote job entry systems in the 1960's. This articles illustrates agent incarnations which can be characterized in a number of ways ranging from simple distributed objects to highly secured software with algorithm that can only be interpreted by only the sender and the receiver. As the sophistication of mobile software has increased over time with its associated threats, This article studies masquerading as one of these threats and provides appropriate solution in the form of algorithm.
Reference :
-
- S. Appleby and S. Steward, Mobile software agents for control in telecommunications networks. BT Technology Journal, Vol. 12. No. 2, pp.104-113. 2000.
- J. Baumann, Mobility in the mobile-agent-system Mole. CaberNet: 3rd Plenary Workshop 1997.
- S.Y Bennet, A Sanctuary for Mobile Agents. Technical Report CS97- 537, University of California in San Diego, 1997
- D. Coppersmith, The Data Encryption Standard and its trength against attacks, IBM J. Res. Dev., 38, pg 243–250. 1994.
- C. David, G. Benjamin, H. Colin, L. David, P. Colin, and T. Gene Itinerant Agents for Mobile Computing, IEEE Personal Communications, vol. 2, no. 5, pp.34-49 2000.
- K. David, and S. Robert, Mobile Agents and the Future of the Internet. Department of Computer Science / Thayer School of Engineering Dartmouth College Hanover, New Hampshire 03755, 1999.
- H. Fritz, and G. Vinga, Eds., Time Limited Blackbox Security Protecting Mobile Agents From Malicious Host, Mobile Agents and Security, pp. 92-113, Springer-Verlag 2000.