Security of Mobile Agent in Ad hoc Network using Threshold Cryptography
نویسندگان
چکیده
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security. Security services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network. Keywords—Ad hoc network, Mobile Agent, Security, Threats, Threshold Cryptography.
منابع مشابه
Analysis of AD HOC Network and Mobile Agent Using Threshold Cryptography
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from net...
متن کاملSecuring Routing Protocol by Distributed Key Management and Threshold Cryptography in Mobile Ad hoc Network
Security is a major concern in mobile ad hoc network due to its various characteristics like infrastructure less nature, self configuring etc. Threshold cryptography used in key distribution of mobile ad hoc network enhances security by distributing each part of the divided secret key to each node. It is an effective technique as it refreshes the shares of each share holder periodically. It mai...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملKey Management and Authentication in Ad Hoc Network based on Mobile Agent
Key management and authentication is important to security of Mobile Ad Hoc network (MANET). Based on the (t, n) threshold cryptography, this paper introduced mobile agents to exchange private key and network topological information with nodes in the network. This method avoids a centralized certification authority to distribute the public keys and the certificates, thus enhances security. Carr...
متن کامل