Mobile Agent Security Based on Artificial Immune System | SpringerLink
Skip to main content

Mobile Agent Security Based on Artificial Immune System

  • Conference paper
International Joint Conference SOCO’14-CISIS’14-ICEUTE’14

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 299))

Abstract

Mobile Agent (MA) is an autonomous entity that can move from a host to another under self-control. It’s a technology for distributed system computing and communication. Although, it creates serious theoretical and practical problems like heterogeneity, preservation of communication, shared resource management and particularly security problem that represents a crucial point for the use of mobile agent applications. To perform its tasks, the agent must move from one site to another, which makes its behavior more vulnerable to different types of attack. To tackle this problem and improve the security of mobile agents, we propose an approach based on Artificial Immune System (AIS). DNA technique is used for code’s encryption and fragmentation. Thus, this new solution is twofold: it protects agents during their migration and it ensures the verification of their trusts while their reception by the destination.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 22879
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 28599
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. de Castro, L.N., Von Zuben, F.J.: Artificial immune system, Part I - Basic theory and applications. Technical Report, RT DCA 01/99 (December 1999)

    Google Scholar 

  2. Dasgupta, D., Nino, L.F.: Immunological Computation. Theory and Applications. Taylor and Francis Group, LLC (2009)

    Google Scholar 

  3. Von Zuben, F.J., De Castro, L.N.: aiNet: An artificial Immune Network for Data analysis. In: Abbass, H.A., Sarker, R.A., Newlton, C.S. (eds.) Data Mining: A Heuristic Approach, ch. XII, pp. 213–259. Idea Group Publishing, USA (2001)

    Google Scholar 

  4. Kawamoto, H., Miyake, S., Miyasaka, M., Ohteki, T., Sorimachi, N., Takahama, Y., Taki, S.: Your Amazing Immune System - How it protects your body. French Translation: European Federation of Immunological Societies in 2010 (2010)

    Google Scholar 

  5. Mishra, A., Choudhary, A.: Mobile Agent:Security Issues and Solution. International Journal of Computer Technology and Electronics Engineering (IJCTEE) 2(6) (December 2012)

    Google Scholar 

  6. Snehi, J., Snehi, M., Goyal, S.: Security Threats to Mobile Agents. In: ACAI 2011, July 21-July 22 (2011)

    Google Scholar 

  7. Dadhich, P., Dutta, K., Govil, M.C.: Security Issues in Mobile Agents. International Journal of Computer Applications 11(4), 0975–8887 (2010)

    Google Scholar 

  8. Shen, Z., Tong, Q.: A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. In: Ninth International Conference on Hybrid Intelligent Systems 2009. IEEE Computer Society (2009)

    Google Scholar 

  9. Ilahi, M., Brahmi, Z., Gammoudi, M.M.: Enhancing Decentralized MAS-Based Framework for Composite Web Services Orchestration and Exception Handling by Means of Mobile Agents Technology. In: Liu, J., Wu, J., Yao, Y., Nishida, T. (eds.) AMT 2009. LNCS, vol. 5820, pp. 347–356. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Rajguru, P.V., Deshmukh, S.B.: Current trends and analysis of mobile agent application. World Journal of Science and Technology, 01–06 (2012)

    Google Scholar 

  11. Hightower, R.R., Forrest, S., Perelson, A.S.: The evolution of emergent organization in immune system gene libraries. In: Pro. of the 6th International Conference on Genetic Algorithms, pp. 344–350 (1995)

    Google Scholar 

  12. Qiu, W., Guan, H., Jiang, X., Huang, Z.: Group oriented Secure Routing Protocol of Mobile Agents. In: International Conference on Computational Intelligence and Security Workshops 2007. IEEE Computer Society (2007)

    Google Scholar 

  13. De Castro, L.N., Von Zuben, F.J.: The clonal selection algorithm with engineering application. In: Proc. of GECCO 2000, Workshop Proceeding, pp. 36–37 (2000)

    Google Scholar 

  14. Timmis, J.: Artificial Immune Systems: A novel data analysis technique inspired by the immune network theory. PhD Thesis, University of Wales (2001)

    Google Scholar 

  15. Ahuja, P., Sharma, V.: A Review on Mobile Agent Security. International Journal of Recent Technology and Engineering (IJRTE) 1(2) (June 2012) ISSN: 2277-3878

    Google Scholar 

  16. Herrero, A., Navarro, M., Corchado, E., Julian, V.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst. 29(1), 250–261 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zaki Brahmi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Brahmi, Z., Lini, A., Gammoudi, M.M. (2014). Mobile Agent Security Based on Artificial Immune System. In: de la Puerta, J., et al. International Joint Conference SOCO’14-CISIS’14-ICEUTE’14. Advances in Intelligent Systems and Computing, vol 299. Springer, Cham. https://doi.org/10.1007/978-3-319-07995-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07995-0_38

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07994-3

  • Online ISBN: 978-3-319-07995-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics