Skip to main content

2020 | OriginalPaper | Buchkapitel

A Hybrid Approach for Protecting Mobile Agents Against Malicious Hosts

verfasst von : Kanduru Phani Kumar, V. Purna Chandra Rao

Erschienen in: Innovations in Computer Science and Engineering

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The mobile agent devices must be part of any static or dynamic network structure for making the complete network and application functioning. In case of the static networks, the application host distributes specific security protocols for securing the mobile nodes. However, in case of the dynamic networks, the client nodes are directed to select the host nodes for making the application operational. During this process, the host can determine the connectivity of the mobile client nodes based on various authentication schemes. Nevertheless, the mobile nodes cannot justify the authenticity of the hosts. Hence, a good amount of changes persists to get connected to a malicious host node for any client nodes. During this kind of situations, the malicious host node can not only tamper the data, but also de-structure the complete network. Henceforth, this work proposes a novel throughput securing and optimization strategy to protect the network throughput during malicious host connections. This work also proposes malicious host connection fault detection in mobile agents using 2ACK plan. In this paper, we have implanted some security concerns with 2ACK to verify secrecy of the message by confirming first hash code with the objective hash code created. Nevertheless, due to the nature of battery power devices in the network for mobility device agents and WSN, the power consumption of the routing protocols also to be considered for the betterment of the routing algorithms. Henceforth, the energy efficiency became the most important criteria for performance evaluation to be considered. Thus, this work evaluates the performance of routing algorithms for highly dense mobility device agent’s architecture. The major outcome of this work is to propose a novel safe host-based algorithm with lesser energy consumption and evaluates improvements over the existing systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Goldsmith A, Effros M, Koetter R, Medard M, Ozdaglar A, Zheng L (2011) Beyond shannon: the quest for fundamental performance limits of wireless ad hoc networks. Published at IEEE Communication on May 2011 Goldsmith A, Effros M, Koetter R, Medard M, Ozdaglar A, Zheng L (2011) Beyond shannon: the quest for fundamental performance limits of wireless ad hoc networks. Published at IEEE Communication on May 2011
2.
Zurück zum Zitat Zhang J, Chen J, Sun Y (2009) Transmission power adjustment of wireless sensor networks using fuzzy control algorithm. Wirel Commun Mob Comput 9:805–818CrossRef Zhang J, Chen J, Sun Y (2009) Transmission power adjustment of wireless sensor networks using fuzzy control algorithm. Wirel Commun Mob Comput 9:805–818CrossRef
3.
Zurück zum Zitat Grossglauser M, Tse DN (2001) Mobility increases the capacity of ad hoc wireless networks. Published at “INFOCOM” Grossglauser M, Tse DN (2001) Mobility increases the capacity of ad hoc wireless networks. Published at “INFOCOM”
4.
Zurück zum Zitat Gamal E, Mammen J, Prabhakar B, Shah D (2006) Optimal throughput-delay scaling in wireless networks—part I: the fluid model. IEEE Trans Inf Theory 52:2568–2592CrossRef Gamal E, Mammen J, Prabhakar B, Shah D (2006) Optimal throughput-delay scaling in wireless networks—part I: the fluid model. IEEE Trans Inf Theory 52:2568–2592CrossRef
6.
Zurück zum Zitat Mariasy GF, Georgiadis P, Flitzanis D, Mandalas K (2006) Cooperation enforcement schemes for Mobile agents: a survey: research articles. Wirel Commun Mob Comput 6(3):319–332CrossRef Mariasy GF, Georgiadis P, Flitzanis D, Mandalas K (2006) Cooperation enforcement schemes for Mobile agents: a survey: research articles. Wirel Commun Mob Comput 6(3):319–332CrossRef
7.
Zurück zum Zitat Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in Mobile Agent Network. J Netw 3(5):13–20 Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in Mobile Agent Network. J Netw 3(5):13–20
8.
Zurück zum Zitat Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in Mobile agents. IEEE Trans Mob Comput 6(5):536–550CrossRef Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in Mobile agents. IEEE Trans Mob Comput 6(5):536–550CrossRef
9.
Zurück zum Zitat Rishiwal V, Verma S, Bajpai SK (2009) QoS based power aware routing in MDAs. Int J Comput Theory Eng 1(1):47–54 Rishiwal V, Verma S, Bajpai SK (2009) QoS based power aware routing in MDAs. Int J Comput Theory Eng 1(1):47–54
10.
Zurück zum Zitat Huang C (2004) On-demand location-aided QoS routing in ad hoc networks. In: Proceedings of IEEE international conference on parallel processing, Aug 2004, pp 502–509 Huang C (2004) On-demand location-aided QoS routing in ad hoc networks. In: Proceedings of IEEE international conference on parallel processing, Aug 2004, pp 502–509
11.
Zurück zum Zitat Lio W-H, Tseng Y-C, Shih K-P (2002) A TDMA-based bandwidth reservation protocol for QoS outing in a wireless mobile ad hoc network. In: Proceedings of IEEE international conference communication, vol 5, pp 3186–3190 Lio W-H, Tseng Y-C, Shih K-P (2002) A TDMA-based bandwidth reservation protocol for QoS outing in a wireless mobile ad hoc network. In: Proceedings of IEEE international conference communication, vol 5, pp 3186–3190
12.
Zurück zum Zitat Punde J, Pissinou N, Makki K (2003) On quality of service routing in ad-hoc networks. In Proceedings of 28th Annual IEEE conference on local area network, Oct 2003, pp 276–278 Punde J, Pissinou N, Makki K (2003) On quality of service routing in ad-hoc networks. In Proceedings of 28th Annual IEEE conference on local area network, Oct 2003, pp 276–278
13.
Zurück zum Zitat Wan P-J, Calinescu G, Li X, Frieder O, Minimum-energy broadcast routing in static ad hoc wireless networks. In: Proceedings of IEEE INFOCOM, Apr 2001, pp 1162–1171 Wan P-J, Calinescu G, Li X, Frieder O, Minimum-energy broadcast routing in static ad hoc wireless networks. In: Proceedings of IEEE INFOCOM, Apr 2001, pp 1162–1171
Metadaten
Titel
A Hybrid Approach for Protecting Mobile Agents Against Malicious Hosts
verfasst von
Kanduru Phani Kumar
V. Purna Chandra Rao
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-2043-3_52