Securing Mobile Ant Agent Using Chinese Remainder Theorem
نویسندگان
چکیده
Recent days, research in wireless network becomes major area for the past few decades. In wireless routing many routing methods such as table driven, source driven; many characteristics such as reactive routing, proactive routing; many routing algorithms such as dijikstra’s shortest path, distributed bell-man ford algorithm are proposed in the literature. For effective wireless routing, the recent ant colony optimization proves better result than the existing methodologies. The ant colony optimization is a swarm intelligence technique which widely used for combinatorial optimization problems such as travelling salesman, network routing, clustering. The ant colony optimization is a real time routing protocol which offers highly reliable and optimal routing for both single path and multi path routing. As the ant is a small tiny mobile agent, providing security is critical issue. In this study, a secured ant colony optimization using Chinese remainder theorem is proposed.
منابع مشابه
Aco Based Mobile Agent for Secured Key Management in Manet
Nowadays, Wireless network becomes unavoidable resource in the modern world. Security of wireless network becomes very important critical research issue in this decade. This paper focused on various kinds of attacks and proposed methodology for authentication. Attacks which may be passive attacks or active attacks will collapse the entire operation of the whole network. The attacks on wireless ...
متن کاملA Secure Integrated Model For Mobile Agent Migration (SIMMAM)
Migration of an agent involves various security problems especially in heterogeneous environment. Most of the reviewed studies for securing the mobile agent depended on one security technique. The proposed model integrates well known security techniques in four security levels: securing Mobile Agent Using Agent Factory & Blueprint, securing Mobile Agent Blueprint, securing Mobile Agent Migratio...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملEfficient Reverse Converter for Three Modules Set {2^n-1,2^(n+1)-1,2^n} in Multi-Part RNS
Residue Number System is a numerical system which arithmetic operations are performed parallelly. One of the main factors that affects the system’s performance is the complexity of reverse converter. It should be noted that the complexity of this part should not affect the earned speed of parallelly performed arithmetic unit. Therefore in this paper a high speed converter for moduli set {2n-1, ...
متن کاملEfficient Reverse Converter for Three Modules Set {2^n-1,2^(n+1)-1,2^n} in Multi-Part RNS
Residue Number System is a numerical system which arithmetic operations are performed parallelly. One of the main factors that affects the system’s performance is the complexity of reverse converter. It should be noted that the complexity of this part should not affect the earned speed of parallelly performed arithmetic unit. Therefore in this paper a high speed converter for moduli set {2n-1, ...
متن کامل