• Title/Summary/Keyword: Mobile 에이전트

Search Result 652, Processing Time 0.019 seconds

SecureJMoblet : Secure Mobile Agent System based on Jini2.0 (SecureJMoblet : Jini2.0 기반의 안전한 이동에이전트 시스템)

  • Yu Yang-Woo;Moon Nam-Doo;Lee Myung-Joon
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.439-450
    • /
    • 2004
  • Mobile agents are autonomous and dynamic entities that can migrate among various nodes in the network. Java's Jini framework facilitates mobile agent system development, providing hey features for distributed network programming. However, due to the security weakness, Jinil.0 service has a fundamental limitation on developing mobile agent systems which support secure remote communications. In this paper, we describe a Jini2.0-based secure mobile agent system named SecureJMoblet. On the top of Jini2.0, the system provides basic functionalities of a mobile agent system such as creation, transfer and control. In addition, with the SeureJS developed for secure JavaSpace service, SecureJMoblet supports a secure object repository and a reliable communication among mobile agents.

Design & Implementation of Secure Mobile Agent Gateway (안전한 이동 에이전트 게이트웨이의 설계 및 구현)

  • Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.240-249
    • /
    • 2002
  • In the course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is use of mobile agents. The mobile agent is capable of migrating autonomously from node to node in the network, to perform some computation on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It also however, suffers from a major drawback, namely, the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describe the design & implementation of secure mobile agent gateway that split and merge the agent cede with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

An Intelligent Mobile Agent System with Planning Capability (계획 기능을 가진 지능형 이동에이전트 시스템)

  • Seok, Hwang-Hee;Kim, In-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3417-3426
    • /
    • 2000
  • Most of conventional mobile agent systems requre that the users or the programmer should give the mobile agenl its detail behavioral script for accomplishing the given task. And during its runtime, such mobile agents just behave acording to the fixed script given by its user. Therefore it is impossible that conventional mobile agents autonomously build their own plans and execute. There in considering their ultirnale goals and the dynamic world states. One way to overcome such limtations of conventional mobile agent systems is to develop an mielligent mobile agent system ombedding a reactive planner.In this paper, we design both a modelof agent inobility and a model of inter-agent commuication based upon the representative reactive planning agent architecture called JAM. An then we develop an intelligent mobile agent system with planing capability, IMAS, by implementing addtional basic actions for agent moves and inter-agent comunication within JAM according too the predevined models. Unlike conventional mobile agents, IMAS agents can be able to adapt, their behaviors to the dynamic changes of their anvironment as well as build their own plans autonomously. Thus IMAS aents can snow higher flexibility and robustness than the conventional ones.

  • PDF

Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status (에이전트 코드와 상태 추적을 통한 이동에이전트의 보호 기법)

  • 정창렬;고진광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.743-750
    • /
    • 2003
  • With the expansion of computer technology the mobility of a mobile agent code having the flexibility in the dispersive computer situation is used to set up the applications distributed on the Internet. As it also has the ability to transmit the mobile code of a mobile agent and to receive it from a far-off host, the executive circumstances of the host system in which an agent is executed have to access to an agent code and the executive state capable of executing an agent code. Therefore, it is difficult to prevent the forgery, the alteration and the wrong execution of an agent from a malicious host. This dissertation suggests the mechanism which can protect an agent from the malicious action through the executive pursuit of a code-named mobile agent. The security of this mechanism is verified through the protective process of a mobile agent in this mechanism.

(Performance Evaluation of Proxy-based Mobile Agent Model for Hierarchical Management Domains) (계층형 관리 도메인을 위한 프록시 기반의 이동 에이전트 모델의 성능 평가)

  • 박상윤
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.8
    • /
    • pp.1049-1062
    • /
    • 2002
  • As the distributed resources in the networks have become increasingly popular, the accesses to these resources having been activated. Especially, the accesses to the distributed resources using the mobile agent technologies provide the mechanisms supporting mobility with mobile users as well as the dynamic accesses to the resources in the fixed networks. Proxy-based mobile agent model is defined as mobile agent network model which allocates the hierarchical domains to the distributed resources changed dynamically, assigns one proxy server for each domain, and promotes the management and the cooperation of the mobile agents. In this paper, we introduce the architecture and the execution scenario for proxy-based mobile agent model which is suitable for the hierarchical management domains. In simulation, we evaluate the proxy server's route optimization functionality and the performance reducing execution time of the mobile agents.

  • PDF

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

Design of the Workflow Interoperability System Using Mobile Agent (이동 에이전트를 이용한 워크플로우 상호운영시스템 설계)

  • 김선호;전수련
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.197-208
    • /
    • 2004
  • As the structure of an enterprise becomes complicated and distributed, the interoperability between workflow systems for the process automation among partners or departments is rising as an important issue. For the interoperability between workflow systems, we propose a data exchange scenario based on mobile agents. The scenario includes sequence diagrams and methods defined by UML. The mobile agents are designed based on the mobile agent standard, MASIF, developed by OMG. In order to prove the applicability of the mobile agent technology to workflow interoperability, we have developed a prototype function which creates and transfers mobile agents.

  • PDF

A Load Balancing and Security Scheme of Mobile Agents based on the mobile Trust Model (신뢰모델을 기반으로 한 이동 에이전트의 로드밸런싱과 에이전트 보호 기법)

  • Jung, Chang-Ryul;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2337-2344
    • /
    • 2013
  • Mobile Agent is an autonomous mobility technology is being applied in various fields. In particular, mobile agents execution in the Internet environment through the safe execution of the security must be guaranteed. Also, agent to run the agent, the agent's workload should be distributed. In this paper, a trust model based on the security mechanism of the agent execution is proposed. Proposed mechanism to ensure safe execution of the agent was not considered in existing relative researches for rational agent workload distribution and load balancing to improve throughput was. The proposed trust-based security mechanisms for agents to go through security analysis proved safe execution of the agent.

Implementation of Network Management by Communicating Mobile Agents with the SNMP Agents (이동 에이전트와 SNMP 에이전트와의 대화를 통한 통신망 관리 구현)

  • Jeon, Byung-Kook
    • Journal of Information Management
    • /
    • v.32 no.1
    • /
    • pp.50-70
    • /
    • 2001
  • As todays's networks are typically heterogeneous and very often comprised of multi-platform, multi-vendor network components, mobile agents have been proposed as a solution to the problem of the management of increasingly heterogeneous networks. Mobile agents are no longer statically resident on managed devices for network management: in contrast, they are migratory, replaceable at any time as necessary, and may be equipped with mini expert systems which can diagnose and fix networks' faults on behalf of the manager. Therefore, in this paper, the MIB browsing facilities for network management using the JAMAS and mobile agents are implemented. That is, the network manager accesses the MIB information through mobile agents with which communicate the SNMP agent of each of managed devices. The implementation performance is also evaluated.

  • PDF

Design and Implementation of Mobile Agent Model Supporting the Optimal Path Search through Traffic Sense (트래픽 감지를 통한 최적 경로 탐색 이동 에이전트 모델 설계 및 구현)

  • Kim Kwang-jong;Ko Hyun;Kim Youngja;Lee Yon-sik
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1421-1435
    • /
    • 2004
  • When various work was given from user, the existing mobile agent model migrated from node to node and process the work at the point that much traffics according to passive routing schedule are happened, until it makes service the work result, time cost of round work process for the distributed nodes are increased. Therefore, the existing agent systems need migration method to solve the problems of agent size increment or a lack of interoperability among agent systems. To solve these problems in this thesis, we design and implement an CORBA-based Mobile Agent Model(CMAM) for the efficient work process into the distributed nodes, when the mobile agents are migrated among the nodes, using an optimal path search by sensing of network traffic.

  • PDF