IJCNIS Vol. 7, No. 11, 8 Oct. 2015
Cover page and Table of Contents: PDF (size: 502KB)
Full Text (PDF, 502KB), PP.37-45
Views: 0 Downloads: 0
Mobile ad-hoc networks, mobile agents, routing, key management, topology discovery
In today’s world mobile agents and mobile ad-hoc networks are the two technologies that are contributing towards better connectivity and communicability. When the two technologies used jointly, the interest is increased. Due to the properties like self-configuration and infrastructure-less, the mobile ad-hoc networks provide various remarkable features. But the various challenges are also associated with mobile ad-hoc networks like dynamic topology, mobility, energy constraint etc. Mobile agent provides solution to these challenges. A mobile agent is a new way of computer interactions and provides better options for the developers to create applications based on connectivity. Mobile agents move around the ad-hoc networks in a different and better way than the other widespread client server architecture based applications. Due to their mobility and autonomy these agents can perform various functions in mobile ad-hoc networks like topology discovery, routing, key management, congestion control etc. The paper reviews the role of the mobile agents in the mobile ad-hoc networks, and emphasizes its application on the various layers of a layered architecture of mobile ad-hoc networks and concludes its merits as compared to other conventional approaches.
Bindiya Bhatia, M.K.Soni, Parul Tomar, "Role of Mobile Agents in the Layered Architecture of Mobile Ad-hoc Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.7, no.11, pp.37-45, 2015. DOI:10.5815/ijcnis.2015.11.04
[1]Abdulrahman Hijazi, “Using Mobile Agents for Intrusion Detection in Wireless Ad Hoc Networks”, Wireless and Optical Communications Networks, 2005. WOCN 2005, Second IFIP International Conference on March 6 - 8, 2005.
[2]Alexandre Manguer, “Mobile agents in ad hoc networks”, thesis, April 2003.
[3]B. Askwith, M. Merabti, Q. Shi and K. Whiteley, “Achieving User Privacy in Mobile Networks,” Proceedings of the 13th Annual Computer Security Applications Conference, San Diego, 1997, pp. 108-116.
[4]Borselius,N.” Mobile agent security” The Electronics & Communication Engineering Journal Vol 5, pp. 211–218 (2002).
[5]Chandreyee Chowdhury, Sarmistha Neogy, “Securing Mobile Agents in MANET against attacks using Trust”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011.
[6]Chaum, “Security without Identification: Transaction Systems to Make Big Brother Obsolete” Communications of ACM, Vol. 28, No. 10, 1985, pp. 1030-1044, doi: 10.1145/4372.4373.
[7]F.Hohl, “Time Limited Black box Security: Protecting Mobile Agents from Malicious Hosts,” To appear in Mobile Agents and Security Book edited by Giovanni Vigna, published by Springer Verlag 1998.
[8]G. C. Necula and P. Lee, “Research on proof-carrying code on mobile-code security,” 1997.
[9]G.Geetha, C.Jayakumar, “Trust Enhanced Data Security in Free Roaming Mobile agents Using Symmetric Key cryptography”, International Journal of Network Security & Its applications (IJNSA), Vol.3, No.5, Sep 2011.
[10]Haghighat, R., Yarahmadi, H.: A New Approach for Mobile Agent Security. In: The Proc. of the World Acadamy of Science, Engineering and Technology, vol. 32, 2008.
[11]Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges”, Ad Hoc Networks Vol 1, pp. 13–64, doi: 10.1016/S1570-8705(03)00013-1
[12]Karlsson, Jonny; Dooley, Laurence S. and Pulkkis, Goran, “Routing Security in Mobile Ad-hoc Networks”, Issues in Informing Science and Information Technology, volume 9, 2012, pp 369 – 383.
[13]L. D'Anna, B. Matt, A. Reisse, T. Van Vleck, S. Schwab, and P. LeBlanc, “Self- Protecting Mobile Agents Obfuscation Report,” Report #03-015, Network Associates Laboratories, June 2003.
[14]Nikos Migas, William J.Buchanan, and Kevin A. McArteny, “Mobile Agents for Routing, Topology Discovery, and Automatic Network Reconfiguration in Ad-Hoc Networks”, in proceeding of 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems (ECBS'03).
[15]N Kawaguchi, K Toyama, Y Inagaki, “MAGNET: ad hoc network system based on mobile agents”, computer communication, volume 23, issue 8, April 2000, pages 705-782, doi: 10.1016/S0140-3664(99)00236-4.
[16]N. Minar, K.H. Kramer, and P. Maes, “Cooperating Mobile Agents for Dynamic Network Routing”, MIT Media Lab, http://xenia.media.mit.edu/~nelson/research/ routes-book chapter/minar.pdf, Software Agents for Future Communication Systems, 1999, ISBN: 978-3-642-63584-7 (Print) 978-3-642-58418-3 (Online), pp 287-304, doi: 10.1007/978-3-642-58418-3_12.
[17]Rajesh Shrivastava, Pooja Mehta (Gahoi), “Analysis of Secure Mobile Agent System”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012.
[18]Rizvi, S.M.S.I., Sultana, Z., Bo, S., Islam, M.W.,” Security of Mobile Agent in Ad hoc Network using Threshold Cryptography”. In: The Proc. of the International Conference on Cryptography, Coding and Information Security (2010).
[19]R. Pushpa Lakshmi, Dr. A. Vincent Antony Kumar, “Cluster Based Composite Key Management in Mobile Ad Hoc Networks”, International Journal of Computer Applications (0975 – 8887), Volume 4 – No.7, July 2010.
[20]R.R. Chpudhury, S. Bandyopadhyay, and K. Paul, “A distributed mechanism for topology discovery in ad hoc wireless networks using mobile agents”, In Proceedings of First Annual Workshop on Mobile Ad Hoc Networking Computing, MobiHOC Mobile Ad Hoc Networking and Computing, August 11, 2000, doi:10.1109/MOBHOC.2000.869229.
[21]R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, “Efficient software-based fault isolation,” In Proceedings of the 14th ACM Symposium on Operating Systems Principles, pages 203--216, Dec. 1993, doi:10.1145/168619.168635.
[22]Saleh Ali K.Al-Omari1, Putra Sumari2, “An overview of mobile ad-hoc networks for the existing protocol and applications”, International journal of application of graph theory in wireless ad-hoc networks and sensor networks, vol 2, No. 1, March 2010.
[23]Samuel Lee, “Mobile Agents”, A tutorial report, Agent based software engineering.
[24]Sathish Alampalayam Kumar, “Classification and Review of Security Schemes in Mobile Computing”, Wireless Sensor Network, 2010, vol 2, pp 419-440.
[25]Shivanajay Marwaha, Chen Khong Tham, Dipti Srinivasan, “Mobile Agents based Routing Protocol for Mobile Ad Hoc Networks”, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE volume 3, pp 17-21, Nov 2002.
[26]Sultanik, E., “Secure Mobile Agents on Ad Hoc Wireless Networks.” The Fifteenth Innovative Applications of Artificial Intelligence Conference Acapulco, Mexico, 2003.
[27]Tarig, M.A.: Using secure-image mechanism to protect mobile agent against malicious host. In: Proc. of World Academy and Science, Engineering and Technology, pp. 439–444 (2009).
[28]Vishnu Kumar Sharma, Dr. Sarita Singh Bhadauria, “Agent based Congestion Control Performance in Mobile ad-hoc Network:A Survey paper”, (IJACSA) International Journal of Advanced Computer Science and Applications, Special Issue on Wireless & Mobile Networks,2012
[29]W. M. Farmer, J. D. Guttman, and V. Swarup, “Security for mobile agents: Authentication and state appraisal,” in Proceedings of the European Symposium on Research in Computer Security (ESORICS’96), ser. Lecture Notes in Computer Science, E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds., vol. 1146. Rome, Italy: Springer, September 1996, pp. 118–130.
[30]Zhang Yi, Zhu Lina and Feng Li, “Key Management and Authentication in Ad Hoc Network based on Mobile Agent”, Journal of Networks, Vol. 4, No. 6, August 2009, doi:10.4304/jnw.4.6.487-494.
[31]CHEN Wei and ZHANG Yi, "A Multiconstrained Routing Algorithm based on Mobile Agent for MANET Networks", International Joint Conference on Artificial Intelligence. IEEE 2009.
[32]Xu Li, Zheng Baoyu, “Cross-Layer Coordinated Energy Saving Strategy in MANET”, Vol.20 No.6 Journal of Electronics (China) Nov. 2003.
[33]Bindhu.R, “Mobile Agent Based Routing Protocol with Security for MANET”, International Journal of Applied Engineering Research, Dindigul Volume 1, No1, 2010.
[34]Mats Person, “Mobile Agent Architectures”, Scientific Report, Dec 2000, Defence Research Establishment, ISSN 1104-9154.
[35]Ahmed, A.; Far, B., "Performance of Mobile Agent Based Network Topology Discovery," Electrical and Computer Engineering, 2007. CCECE 2007. Canadian Conference on, vol., no., pp.66-69, 22-26 April 2007, doi: 10.1109/CCECE.2007.24.
[36]Annapurna Patil, Saunhita Sapre,” Intelligent Energy Efficient Routing Protocol based on Biological Agents for MANETS”, International Journal of Emerging Technology and Advanced Engineering, (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 7, July 2014.
[37]M. Darji, B.Trivedi, “Secure Leader Election Algorithm Optimized for Power Saving”, Proceedings of international conference on Recent Trends in Computer Networks and Distributed Systems Security, Trivandrum, India, October 11-12, 2012, DOI 10.1007/978-3-642-34135-9.
[38]B. Pahlevanzadeh, S.A. Hosseini Seno, T.C. Wan, R. Budiarto, Mohammed M. Kadhum, “A Cluster-Based Distributed Hierarchical IDS for MANETs”, International Conference on Network Applications, Protocols and Services 2008.
[39]Neogy, R.; Chowdhury, C.; Neogy, S., "A reliable service discovery protocol using mobile agents in MANET," Reliability and Maintainability Symposium (RAMS), 2012 Proceedings - Annual, vol., no., pp.1,7, 23-26 Jan, 2012, doi: 10.1109/RAMS.2012.6175451.
[40]Hamad, H., “Distributed Mobile Agents for reliable cluster management in MANETs,” International Journal of Interactive Mobile Technologies (iJIM), Issue 2, vol. 2, Apr. 2008, pp. 11-17.