Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/11755
Full metadata record
DC FieldValueLanguage
dc.contributor.authorDipakkumar, Desai Nimeshkumar-
dc.date.accessioned2014-11-28T05:34:56Z-
dc.date.available2014-11-28T05:34:56Z-
dc.date.issued2007-
dc.identifierM.Techen_US
dc.identifier.urihttp://hdl.handle.net/123456789/11755-
dc.guideGarg, Kum Kum-
dc.guideVeeravalli, Bhardwaj-
dc.guideMisra, Manoj-
dc.description.abstractMobile agents provide an effective alternative to traditional client-server architecture. Agents carry the code and move towards the data. This reduces network latency and burden on the server. But agent infrastructure is prone to many attacks. Mobile agent security has been an area of research since mobile agents were introduced. Though it is very useful and effective to send agents which can perform tasks on behalf of the user, attacks to such agents and agent platforms are very common and can cause many serious problems. Securing mobile agent communication is essential to its reliability and usefulness among naive end users. Attacks such as masquerade, eavesdropping, replay, repudiation, denial of service are possible against agent environment. In this dissertation work, we have designed a hierarchical scheme for securing agent communication. In this work we have modeled centralized agent security scheme using Coloured Petri Nets. In this scheme, agent platforms are divided into domains and each domain has a Domain Controller or Trust Server. Agent platforms connect to the Trust Server over wireless links. Trust Server themselves are connected to Trusted-Third-Party. Trusted-Third-Party manages inter-domain communication. Security is achieved by proper authentication of agents and agent platforms and also by auditing of the agent movements. Coloured Petri Nets have been used widely in the modeling of parallel and distributed applications. In our work, CPN Tools has been used to model the system using Coloured Petri Nets. The modeling is performed on the Windows Xp operating system. Simulations and Data monitors were used for initial investigations of the protocol's behavior. iven_US
dc.language.isoenen_US
dc.subjectELECTRONICS AND COMPUTER ENGINEERINGen_US
dc.subjectPROTECTING MOBILE AGENTen_US
dc.subjectCLIENT-SERVER ARCHITECTUREen_US
dc.subjectMOBILE AGENTen_US
dc.titleMODELING OF HIERARCHICAL SCHEME FOR PROTECTING MOBILE AGENTen_US
dc.typeM.Tech Dessertationen_US
dc.accession.numberG13424en_US
Appears in Collections:MASTERS' THESES (E & C)

Files in This Item:
File Description SizeFormat 
ECDG13424.pdf3.12 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.