• Title/Summary/Keyword: Agent protection mechanism

Search Result 35, Processing Time 0.028 seconds

Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status (에이전트 코드와 상태 추적을 통한 이동에이전트의 보호 기법)

  • 정창렬;고진광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.743-750
    • /
    • 2003
  • With the expansion of computer technology the mobility of a mobile agent code having the flexibility in the dispersive computer situation is used to set up the applications distributed on the Internet. As it also has the ability to transmit the mobile code of a mobile agent and to receive it from a far-off host, the executive circumstances of the host system in which an agent is executed have to access to an agent code and the executive state capable of executing an agent code. Therefore, it is difficult to prevent the forgery, the alteration and the wrong execution of an agent from a malicious host. This dissertation suggests the mechanism which can protect an agent from the malicious action through the executive pursuit of a code-named mobile agent. The security of this mechanism is verified through the protective process of a mobile agent in this mechanism.

An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems (Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘)

  • Jung, Chang-Ryul;Yoon, Hong-Sang;Koh, Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.371-378
    • /
    • 2002
  • In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.

A Framework of Agent Protection Protocol for Secure Execution of Mobile Agent

  • Jung, Chang-Ryul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.371-378
    • /
    • 2004
  • As an agent is applied into various fields, it is suggested as the paradigm of new application technology in the area of computer communication. However, the mobile agent brines the problem of security on an agent due to mobility. This study proposals the mobile agent protection protocol framework for more effective protection and safety. The designed Framework of protocol uses the public ky, the private key and the digital signature in PKI environment based on JAVA. This is the mechanism accomplishing safely the work of an agent by tracking the pattern of execution and the mobility plan through the VS(verification server). This also secures the suity and the flawlessness of an agent through the VS guaranteeing safety from malicious attacks.

A Study on an Overload Control Scheme for Intelligent Networks Based on Mobile Agent Technology (지능망에서의 이동 에이전트를 이용한 과부하제어 메커니즘에 관한 연구)

  • 이광현;박승균;박주희;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.7C
    • /
    • pp.696-703
    • /
    • 2002
  • In traditional approaches to IN load control, there has been a focus on the protection of individual SCPs. On the other hand, the load control of network level can be achieved by using a mobile agent technology, which is a software element responsible for moving from one system to another and performing their task. In this thesis, we propose an mobile agent mechanism and two mobile agent migration procedures and analyze the performance of the Call Gapping mechanism and the mobile agent mechanism. The mobile agent mechanism showed that the SCP load control rate and attempt the number of attempted call failure were better than those of Call Gapping mechanism. Also, the amount of SS NO.7 traffics was reduced in the case of an overload condition.

A Security Scheme of Mobile Agent using QCRT from Colluded Truncation Attacks (공모된 체인 절단 공격으로부터 QCRT를 이용한 이동 에이전트의 보호 기법)

  • Jung, Chang-Ryul;Kim, Kwang-Oh;Song, Jin-Kook;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.382-388
    • /
    • 2011
  • This paper proposes a mechanism that guarantees secured performance against DDoS attack to protect data from free-roaming agent. Also, as it makes up QCRT(query chain relationship tree) structure which is an enhanced chain relation of existing chain relations that improves extension, It also finds malicious elements. The proposed mechanism extends chain relationship of agent as well by checking chain relation structure as a structure according to the route of agent. For it complements existing weakness with single-side chain relation extension, it guarantees secure performance against DDoS and truncation attacks from mobile agent.

A Cooperative Multiagent System for Enhancing Smart Grid Performance

  • Mohammad A Obeidat
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.164-172
    • /
    • 2023
  • Sharing power data between electrical power grids is crucial in energy management. The multi-agent approach has been applied in various applications to improve the development of complex systems by making them both independent and collaborative. The smart grid is one of the most intricate systems that requires a higher level of independence, reliability, protection, and adaptability to user requests. In this paper, a multi-agent system is utilized to share knowledge and tackle challenges in smart grids. The shared information is used to make decisions that aid in power distribution management within the grid and with other networks. The proposed multi-agent mechanism improves the reliability of the power system by providing the necessary information at critical times. The results indicate that the multi-agent system operates efficiently and promptly, making it a highly promising candidate for smart grid management.

A Mechanism for the Protection of Mobile Agent Using a Group Cryptography (그룹 지정 암호화를 활용한 이동 에이전트 보호 메커니즘)

  • 한승완;임형석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.841-843
    • /
    • 2001
  • 본 논문에서는 이동 에이전트이 여정에 포함된 호스트들만이 이동 에이전트를 복호화하여 실행할 수 있도록 함으로써 이동에이전트를 보호하는 메커니즘을 제안한다. 이를 위하여 본 논문에서는 기존의 그룹 지정 암호화 방법들을 비교 분석하고 그 중에서 이동 에이전트 환경에 가장 적합한 중국인의 나머지 정리에 기반한 그룹 지정 암호화 방법을 이동 에이전트 보호 메커니즘에 활용한다.

  • PDF

A Study of Protection Mechanism using License Agent based PKI (PKI 기반의 라이선스 에이전트를 이용한 암호화 기법 관한 연구)

  • Ko, Jae-Woon
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.499-502
    • /
    • 2010
  • 본 논문에서는 동영상 데이터 암호화를 위해 비디오 데이터의 I-프레임 암호화 기법을 제안한다. 또한 시스템 서버에서 암호화된 멀티미디어 데이터를 클라이언트 시스템에서 사용자가 실행할 때 자동으로 사용자 인증과 데이터의 복호화를 수행할 수 있도록 하는 라이선스 에이전트를 제안한다. 라이선스 에이전트는 사용자의 멀티미디어 데이터의 실행 시 공유 키 풀(shared key pool)을 이용한 PKI(Public Key Infrastructure)기반의 사용자의 인증과 멀티미디어 데이터의 암호 및 복호화를 수행한다. 또한 비밀키 기반의 공개키 분배 시스템을 이용하여 키의 누출을 미연에 방지하고 키의 누출 시 그 경로를 추적할 수 있도록 하였다.

  • PDF

Dyeing and Printing on Aramid Materials (아라미드 소재의 침염 및 날염)

  • Hong, Jin-Pyo;Kim, Mi-Kyung;Yoon, Seok-Han;Choi, Woo-Hyuk
    • Textile Coloration and Finishing
    • /
    • v.23 no.4
    • /
    • pp.298-303
    • /
    • 2011
  • Aramid fibers have been widely used as the reinforcement for composites due to their high modulus and strength. Nowadays the safety measures is required to improve the personal protection. The dyeing of aramid fibers is considered to be very difficult and their dyeing mechanism is not well illucidated. Therefore, this study is to establish the dyeing & printing technology for aramid fibers. The effects of swelling agent and neutral salt in the dye bath on the obtained colors were studied. Also dyeing method of aramid fibers depending on dyeing temperature and dye concentration were established. Color fastness of the dyed aramid fabric with cationic dyes were acceptable excluding light fastness.

Improvement of Biological Control against Bacterial Wilt by the Combination of Biocontrol Agents with Different Mechanisms of Action

  • Kim, Ji-Tae;Kim, Shin-Duk
    • Journal of Applied Biological Chemistry
    • /
    • v.50 no.3
    • /
    • pp.136-143
    • /
    • 2007
  • Despite the increased interests in biological control of soilborne diesease for environmental protection, biological control of bacterial wilt caused by Ralstonia solanacearum have not provided consistent or satisfying results. To enhance the control efficacy and reducing the inconsistency and variability, combinations of specific strains of microorganisms, each having a specific mechanism of control, were applied in this study. More than 30 microorganisms able to reduce the activity of pathogen by specific mechanism of action were identified and tested for their disease suppressive effects. After in vitro compatibility examinations, 21 individual strains and 15 combinations were tested in the greenhouse. Results indicated three-way combinations of different mode of control, TS3-7+A253-16+SKU78 and TS1-5+A100-1+SKU78, enhanced disease suppression by 70%, as compared to 30-50% reduction for their individual treatments. This work suggests that combining multiple traits antagonizing the pathogen improve efficacy of the biocontrol agents against Ralstonia solanacearum.