Security_of_Mobile_Agent_in_Adhoc_network - Security of...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Security of Mobile Agent in Ad hoc Network using Threshold Cryptography S.M. Sarwarul Islam Rizvi, Zinat Sultana ICSS, KTH Royal Institute of Technology Abstract — In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. The main advantage of using Mobile Agent in a network is - it reduces network traffic load. In an ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security services. Confidentiality, Integrity, Authentication, Authorization and Non-Repudiation services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect both the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network. Keywords Ad hoc network, Mobile Agent, Threshold Cryptography, Security, Threats. I. INTRODUCTION With the introduction of wireless network and advancement of 802.11 protocol the concept of wireless ad hoc network has been evolved from the necessity of having a mobile, dynamic and self-organized network where there will be no specialized nodes (i.e, routers to provide routing and packet forwarding service). The procedure to ensure security services in such network is a bit different from traditional wired or wireless networks and also not so trivial. Several methods have been developed in this arena. Among them the use of Mobile Agent has got a lot of attention among the security people. But mobile agent is also not out of threats. So security of mobile agent is important because security of mobile agent and security of the network that use mobile agent for security purposes are complementary. In this section a brief discussion has been presented about the ad hoc network, threshold cryptography and about mobile agent. In the next section some light have been shaded on different security issues and potential threats in a mobile agent system. Some researches have been conducted in the relevant field. Those have been discussed in third section. Then we have presented our proposed model or solution. At last there is a conclusion included where some outcomes of the work and idea of some future works have been discussed. Ad hoc Network ‘Ad hoc’ is a Latin phrase. It means “for this purpose” [1]. And an ad hoc network is usually a small network (e.g., LAN), which is built spontaneously as wireless devices get connected with each other [2]. In an ad hoc network there is no concept of central dependency. So, there is no central router or server for providing routing decisions, network monitoring, analysis and management. Nodes in the network work together while
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

Security_of_Mobile_Agent_in_Adhoc_network - Security of...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online