Skip to main content

Mobile Agent Security Based on Trust Model in MANET

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 190))

Included in the following conference series:

Abstract

There is an emerging trend of using mobile agents for wireless network applications. For instance mobile agents can be used to protect the mobile ad hoc network (MANET) itself by using agent based IDS or IPS.In this paper we consider security issues that need to be addressed before multi-agent systems in general, and mobile agents in particular, can be used for a broad range of commercial applications for MANET. Here we propose a distributed scheme to protect both the agents and the host platforms (running at the nodes) from possible threats. This paper seeks to form a distributed trust model of the network. Here the agents and the host platforms work together to so that each trusted node may form a consistent trust view of the network. Each agent is given with a list of nodes (host platforms) to visit by their owner (a node). The agents, while migrating share their view of the trusted hosts to the platform they currently reside. The agents use combination of encryption and digital signature (to create hash code) to provide privacy and authentication services.Here smooth random mobility model is used to generate node mobility. The connectivity between the nodes is decided by the Two-Ray model of radio propagation in order to consider multipath propagation effect. The effect of environmental noise is also studied. Our proposed algorithm is simulated using java and the results show the robustness of our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chowdhury, C., Neogy, S.: Estimating Reliability of Mobile Agent System for Mobile Ad hoc Networks. In: IEEE Proc. 3rd International Conference on Dependability, pp. 45–50 (2010)

    Google Scholar 

  2. Cao, J., Feng, X., Lu, J., Das, S.K.: Mailbox-Based Scheme for Designing Mobile Agent Communications. Computer 35(9), 54–60 (2002)

    Article  Google Scholar 

  3. Migas, N., Buchanan, W.J., McArtney, K.: Migration of mobile agents in ad-hoc, Wireless Networks. In: Proc.11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems, pp. 530–535 (2004)

    Google Scholar 

  4. Meier, R.T., Dunkel, J., Kakuda, Y., Ohta, T.: Mobile agents for service discovery in ad hoc networks. In: Proc. 22nd International Conference on Advanced Information Networking and Applications, pp. 114–121 (2008)

    Google Scholar 

  5. Jansen, W., Karygiannis, T.: Mobile Agent Security, NIST Special Publication, http://csrc.nist.gov/publications/nistpubs/800-19/sp800-19.pdf

  6. Rizvi, S.M.S.I., Sultana, Z., Bo, S., Islam, M.W.: Security of Mobile Agent in Ad hoc Network using Threshold Cryptography. In: The Proc. of the International Conference on Cryptography, Coding and Information Security (2010)

    Google Scholar 

  7. Tarig, M.A.: Using secure-image mechanism to protect mobile agent against malicious host. In: Proc. of World Academy and Science, Engineering and Technology, pp. 439–444 (2009)

    Google Scholar 

  8. Borselius, N.: Mobile agent security. The Electronics & Communication Engineering Journal 14(5), 211–218 (2002)

    Article  Google Scholar 

  9. Yee, B.S.: A Sanctuary for Mobile Agents. In: Ryan, M. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 261–273. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  10. Haghighat, R., Yarahmadi, H.: A New Approach for Mobile Agent Security. In: The Proc. of the World Acadamy of Science, Engineeringand Technology, vol. 32 (2008)

    Google Scholar 

  11. Li, N., Das, S.K.: A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks (in press)

    Google Scholar 

  12. Songsiri, S.: MTrust: A Reputation-Based Trust Model for a Mobile Agent System. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 374–385. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Bettstetter, C.: Smooth is better than sharp: a random mobility model for simulation of wireless networks. In: The Proc. of the Fourth ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 19–25 (2001)

    Google Scholar 

  14. Rooryck, M.: Modelling multiple path propagation- Application to a two ray model. The Journal of L’Onde Electrique 63, 30–34 (1983) ISSN 0030-2430

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chowdhury, C., Neogy, S. (2011). Mobile Agent Security Based on Trust Model in MANET. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22709-7_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22708-0

  • Online ISBN: 978-3-642-22709-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics