Dhiraj Pandey

Work place: JSS Academy of Technical Education, Noida /Department of Information Technology, Uttar Pradesh, 201301, India

E-mail: dhirajpandey@jssaten.ac.in

Website:

Research Interests:

Biography

Dr. Dhiraj Pandey is Ph.D. (2018) in Computer Science and Engineering on “Secret Sharing Schemes using Visual Cryptographic Aspects: Analysis and Improvements” from School of Computing and Information Technology, Manipal University, Jaipur Campus, India. M.Tech. in Information Technology (2007)-GGS Indraprastha University (IPU), Govt. Of Delhi, New Delhi. B.Tech. in Information Technology (2003)-Ch. Charan Singh University, Meerut.

Author Articles
Secure Mobile Agent Migration Using Lagrange Interpolation and Fast Fourier Transformation

By Pradeep Kumar Niraj Singhal Dhiraj Pandey Avimanyou Vatsa

DOI: https://doi.org/10.5815/ijcnis.2023.04.07, Pub. Date: 8 Aug. 2023

Mobile agent is a processing unit works on the behalf of host computer. Mobile agent with intelligence provides a new computing prototype that is totally different from conventional prototype. Mobile agents are automatically itinerating from one host Computer to another host computer and execute assigned task on the behalf of user in heterogeneous environment under own control. Because mobile agents roam around distributed networks automatically, the security of the agents and platforms is a major concern. The number of mobile agents-based software applications has increased dramatically over the past year. It has also enhanced the security risks associated with such applications. Most protection systems in the mobile agent paradigm focus on platform security and provide few guidelines for mobile agent security, which is still a challenging topic. There is a risk to information carries by mobile agents from the malicious mobile agents who can modify and steal the confidential information. In this paper proposed multilevel authentication framework of mobile agents and platform based on Lagrange interpolation and fast Fourier transformation (LIFFT). In this frame work ‘n’ number of mobile agent have two level of security first level key used authentication and second level of key used for execution of mobile agents.

[...] Read more.
Other Articles