Open Access Open Access  Restricted Access Subscription Access

Self-Protected Mobile Agent Paradigm for DDoS Threats using Block Chain Technology


Affiliations
1 Department of Information Systems, Helwan University, Egypt
 

This paper describes Mobile Agents paradigm for tracking and tracing the effects of Denial of Service security threat in Mobile Agent System, an implementation of this paradigm has been entirely developed in java programming language. The proposed paradigm considers a range of techniques that provide high degree of security during the mobile agent system life cycle in its environment.

This paper highlights the spot to two main design objectives: The importance of including various supportive types of agents within a system e.g., police agents, service agents, …etc. Second: Evaluation analysis and number of checks to be done to trace the Mobile Agents if denial of the provided services during its path. Evaluation analysis for detecting tolerance differences for the calculated agent’s route before and during its journey, storing agent transactions, storing snapshots of agent state information, checking from time to time agent status and task completeness and lastly guard agent checks the changed variables of migrated agent. During tracing and monitoring Mobile Agents, the initiator node may destroy it and continue with another. In this paper a new paradigm is presented that detects and eliminate with high probability, any degree of tampering within a reasonable amount of time, also provide the ability of scalability of security administration.


Keywords

Mobile Agents, Denial of Service DDoS, Security Threats, Block Chain Technology BCT, Trust.
User
Notifications
Font Size

  • Ahila, S. Sobitha, and K. L. Shunmuganathan. “Overview of mobile agent security issues— Solutions.” In Information Communication and Embedded Systems (ICICES), International Conference on, pp. 1-6. IEEE, 2014.
  • Aloui, Imene, Okba Kazar, Laid Kahloul, and Sylvie Servigne. “A new Itinerary planning approach among multiple mobile agents in wireless sensor networks (WSN) to reduce energy consumption.” International Journal of Communication Networks and Information Security Vol.7, no.2, 2015.
  • Bagga, Pallavi, and Rahul Hans. “Applications of mobile agents in healthcare domain: a literature survey.” International Journal of Grid Distribution Computing Vol.8, no. 5, pp.55-72, 2015.
  • Bhaskar, B., Kumar T. Jagadish., Kamal, M.V., “A Security Determination-Reaction Architecture for Heterogeneous Distributed Network.”, IJSRCSE, Vol.5, Issue.5, pp.22-34, 2017.
  • Calvaresi, D., et al., Multi-agent systems and blockchain: Results from a systematic literature review, Conference: Swiss eHealth Summit 2018.
  • Chowhan, R., Mobile Agent Programming Paradigm and its Application Scenarios, International Journal of Current Microbiology and Applied Sciences, Volume 7 Number 05, 2018.
  • Chowhan, R., Dayya, P., Itinerary and Mobile Code Patterns for Emerging Mobile Agent Systems in Large Scale Distributed Environments, International Journal of Computer Sciences and Engineering, Volume 6, Issue 5, May 2018.
  • Dinh, Hoang T., Chonho Lee, Dusit Niyato, and Ping Wang. “A survey of mobile cloud computing: architecture, applications, and approaches.” Wireless communications and mobile computing Vol.13, no.18 pp.1587-1611, 2013.
  • Dounya, K., et al., A new approach based mobile agent system for ensuring secure big data transmission and storage, 2017 International Conference on Mathematics and Information Technology (ICMIT).
  • Gavalas, Damianos, Ioannis E. Venetis, Charalampos Konstantopoulos, and Grammati Pantziou. “Mobile agent itinerary planning for WSN data fusion: considering multiple sinks and heterogeneous networks” International Journal of Communication Systems Vol.30, no.8, 2017.
  • Hasan, Ragib, Md Mahmud Hossain, and Rasib Khan. “Aura: An iot based cloud infrastructure for localized mobile computation outsourcing.” In Mobile Cloud Computing, Services, and Engineering (MobileCloud), 3rd IEEE International Conference on, pp. 183-188. IEEE, 2015.
  • Karim, M., Security for Mobile Agents and Platforms: Securing the Code and Protecting its Integrity, Journal of Information Technology & Software Engineering, Volume 8, Issue 1, 2018.
  • Kilari, N., Sridaran, R., An Overview of DDoS Attacks in Cloud Environment, International Journal of Advanced Networking and Applications IJANA, Special Issue pp: 124-126.
  • Miller, Naomi Liora, Harold Roy Miller, and Warren Stableford. “Translation of user requests into itinerary solutions.” U.S. Patent 9,659,099, issued May 23, 2017.
  • Rahul Singh Chowhan and Rajesh Purohit, “Study of mobile agent server architectures for homogeneous and heterogeneous distributed systems.” International Journal of Computer Applications Vol.156, No. 4, pp.32-37, 2016.
  • Rahul Singh Chowhan, Amit Mishra, and Ajay Mathur, “Aglet and kerrighed as a tool for load balancing and scheduling in distributed environment.” In Recent Advances and Innovations in Engineering (ICRAIE), International Conference on, pp.1-6. IEEE, 2016.
  • Shermin, V.: Disrupting governance with blockchains and smart. Strategic Change Vol 26, Issue 5, 2017. pp499–509.
  • Shiraz, Muhammad, Abdullah Gani, Rashid Hafeez Khokhar, and Rajkumar Buyya. “A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing.” IEEE Communications Surveys & Tutorials Vol.15, no. 3, pp.1294-1313, 2013.
  • Singla, Annie., Jain, Kamal., Gairola, Ajay., “Delving into Security of Networks-Time’s Need” IJSRNSC, Vol.2, Issue.3, pp.1-8, 2014.
  • Tapscott, D., Tapscott, A.: Blockchain Revolution: How the technology behind Bitcoin is changing money, business, and the world. Penguin, 2016.
  • Singla, Annie., Jain, Kamal., Gairola, Ajay., “Delving into Security of Networks-Time’s Need” IJSRNSC, Vol.2, Issue.3, pp.1-8, 2014.

Abstract Views: 225

PDF Views: 0




  • Self-Protected Mobile Agent Paradigm for DDoS Threats using Block Chain Technology

Abstract Views: 225  |  PDF Views: 0

Authors

Mona Nasr
Department of Information Systems, Helwan University, Egypt

Abstract


This paper describes Mobile Agents paradigm for tracking and tracing the effects of Denial of Service security threat in Mobile Agent System, an implementation of this paradigm has been entirely developed in java programming language. The proposed paradigm considers a range of techniques that provide high degree of security during the mobile agent system life cycle in its environment.

This paper highlights the spot to two main design objectives: The importance of including various supportive types of agents within a system e.g., police agents, service agents, …etc. Second: Evaluation analysis and number of checks to be done to trace the Mobile Agents if denial of the provided services during its path. Evaluation analysis for detecting tolerance differences for the calculated agent’s route before and during its journey, storing agent transactions, storing snapshots of agent state information, checking from time to time agent status and task completeness and lastly guard agent checks the changed variables of migrated agent. During tracing and monitoring Mobile Agents, the initiator node may destroy it and continue with another. In this paper a new paradigm is presented that detects and eliminate with high probability, any degree of tampering within a reasonable amount of time, also provide the ability of scalability of security administration.


Keywords


Mobile Agents, Denial of Service DDoS, Security Threats, Block Chain Technology BCT, Trust.

References