Light wieght Authentication System and resource Monitoirng using MAS
نویسندگان
چکیده
Application, resource and Network supervision and trust management is a significant issue due to today’s speedily development of computer and communication environment specially in Local Area Network (LAN).Client-server based network management approach suffer from problems such as insufficient scalability, interoperability, reliability, and flexibility, as networks become more geographically distributed [1]. Another big issue is trust management. RSA, DES and Kerberos is another good methods to achieve authentication but require but high computation is a big deal for LAN, another issue is availability. In this paper, we have proposed a new (novel) light weight approach for resource and trust management using the concept of Multi agent system. Proposed method used the concept of certificate authority (AS of Kerberos) for authenticating the users in LAN or peer to peer network. Availability and minimum delay are the key factor of any authentication scheme, in this paper we proposed a fresh new concept for authenticity and supervision of resources. Our Mobile agent based solution will work same as Kerberos with better throughput and with high availability due to distributed and roaming features of MAS system. Proposed method provides good solution for trust management as well as supervision for network resource and application. We have used SPADE for development of MAS. Keywords-Authentication, kerberos ,MAS ,Resource management, SPADE
منابع مشابه
DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملModelling farmland conversion integrating multi-agent systems and resource economics theory
Farmland conversion, i.e. conversion of farmland into non-agricultural construction land, is an unavoidable trend in global economic development(Fazal 2001; Tan et al. 2005; Bugri 2008). In China, which is relatively short of farmland resources and yet in the phase of accelerating urbanization, conversion of farmland is closely related to national food security, ecological security as well as s...
متن کامل