Advertisement

A Hybrid Approach for Protecting Mobile Agents Against Malicious Hosts

  • Kanduru Phani Kumar
  • V. Purna Chandra Rao
Chapter
  • 26 Downloads
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 103)

Abstract

The mobile agent devices must be part of any static or dynamic network structure for making the complete network and application functioning. In case of the static networks, the application host distributes specific security protocols for securing the mobile nodes. However, in case of the dynamic networks, the client nodes are directed to select the host nodes for making the application operational. During this process, the host can determine the connectivity of the mobile client nodes based on various authentication schemes. Nevertheless, the mobile nodes cannot justify the authenticity of the hosts. Hence, a good amount of changes persists to get connected to a malicious host node for any client nodes. During this kind of situations, the malicious host node can not only tamper the data, but also de-structure the complete network. Henceforth, this work proposes a novel throughput securing and optimization strategy to protect the network throughput during malicious host connections. This work also proposes malicious host connection fault detection in mobile agents using 2ACK plan. In this paper, we have implanted some security concerns with 2ACK to verify secrecy of the message by confirming first hash code with the objective hash code created. Nevertheless, due to the nature of battery power devices in the network for mobility device agents and WSN, the power consumption of the routing protocols also to be considered for the betterment of the routing algorithms. Henceforth, the energy efficiency became the most important criteria for performance evaluation to be considered. Thus, this work evaluates the performance of routing algorithms for highly dense mobility device agent’s architecture. The major outcome of this work is to propose a novel safe host-based algorithm with lesser energy consumption and evaluates improvements over the existing systems.

Keywords

Mobility agent security Routing security Communication security Energy efficiency Reduced complexity 

References

  1. 1.
    Goldsmith A, Effros M, Koetter R, Medard M, Ozdaglar A, Zheng L (2011) Beyond shannon: the quest for fundamental performance limits of wireless ad hoc networks. Published at IEEE Communication on May 2011Google Scholar
  2. 2.
    Zhang J, Chen J, Sun Y (2009) Transmission power adjustment of wireless sensor networks using fuzzy control algorithm. Wirel Commun Mob Comput 9:805–818CrossRefGoogle Scholar
  3. 3.
    Grossglauser M, Tse DN (2001) Mobility increases the capacity of ad hoc wireless networks. Published at “INFOCOM”Google Scholar
  4. 4.
    Gamal E, Mammen J, Prabhakar B, Shah D (2006) Optimal throughput-delay scaling in wireless networks—part I: the fluid model. IEEE Trans Inf Theory 52:2568–2592CrossRefGoogle Scholar
  5. 5.
    Lorenzini E (2007) Cooperation. In: Proceedings of sustainable cooperative multi-hop wireless network (Online). http://www.research.microsoft.com/enus/um/people/ratul/…/nsdi2005-catch.pdf
  6. 6.
    Mariasy GF, Georgiadis P, Flitzanis D, Mandalas K (2006) Cooperation enforcement schemes for Mobile agents: a survey: research articles. Wirel Commun Mob Comput 6(3):319–332CrossRefGoogle Scholar
  7. 7.
    Tamilselvan L, Sankaranarayanan V (2008) Prevention of co-operative black hole attack in Mobile Agent Network. J Netw 3(5):13–20Google Scholar
  8. 8.
    Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in Mobile agents. IEEE Trans Mob Comput 6(5):536–550CrossRefGoogle Scholar
  9. 9.
    Rishiwal V, Verma S, Bajpai SK (2009) QoS based power aware routing in MDAs. Int J Comput Theory Eng 1(1):47–54Google Scholar
  10. 10.
    Huang C (2004) On-demand location-aided QoS routing in ad hoc networks. In: Proceedings of IEEE international conference on parallel processing, Aug 2004, pp 502–509Google Scholar
  11. 11.
    Lio W-H, Tseng Y-C, Shih K-P (2002) A TDMA-based bandwidth reservation protocol for QoS outing in a wireless mobile ad hoc network. In: Proceedings of IEEE international conference communication, vol 5, pp 3186–3190Google Scholar
  12. 12.
    Punde J, Pissinou N, Makki K (2003) On quality of service routing in ad-hoc networks. In Proceedings of 28th Annual IEEE conference on local area network, Oct 2003, pp 276–278Google Scholar
  13. 13.
    Wan P-J, Calinescu G, Li X, Frieder O, Minimum-energy broadcast routing in static ad hoc wireless networks. In: Proceedings of IEEE INFOCOM, Apr 2001, pp 1162–1171Google Scholar
  14. 14.
    The upb/hyccups dataset, Radu I. Ciobanu, Ciprian Dobre. https://crawdad.org/upb/hyccups/20161017/

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Kanduru Phani Kumar
    • 1
  • V. Purna Chandra Rao
    • 2
  1. 1.Research Scholar, Department of Computer ScienceDravidian UniversityKuppamIndia
  2. 2.CSEMLR Institute of TechnologyHyderabadIndia

Personalised recommendations