Implementing Security in Mobile Agents by using AES Technique
Main Article Content
Abstract
Mobile Agent is a program which travels from one platform to another in order to get its work done. An agent is safe in its owner site but when it ventures out and gets executed on some other platform, it becomes vulnerable to many attacks. There are many counter measures that have been proposed in this paper to overcome these attacks. Cryptography based technique i.e. Symmetric Key Algorithm (specifically AES) is one such counter measure taken to provide security. An example case study of client server application has been considered to address the issue of security. Mobile agent is implemented on the aglet client agent host using a platform known as Aglet. Aglet is a java object which moves in a network and gets executed on host which are aglet enabled. AES using Aglet and Java have been implemented to provide security to the mobile agent. The results show how the client agent and server agent can exchange information over internet in a secure manner. The private data entered by client agent is encrypted using AES key which is provided by the server agent to the client agent in an encrypted form. This means that only server agent can decrypt this because he has AES key.
Keywords: Mobile Agent [MA], Aglets, AES, Encryption, Decryption
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.