Abstract
Inside this paper, a trust and reputation-based model is proposed that a mobile agent system can implement to secure agent as well as the platform for malicious agent and platform. This model is unique in the protection of agent to the platform as well as the platform to agent denial-of-service attacks. The reputation of any platform can be calculated by taking the average trust values of all its mobile agents. JADE analysis shows the results that prove the uniqueness of this model in comparison with other models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lange, D.B., & Oshima, M. Introduction to mobile agents. General Magic Inc., Sunnyvale, California, USA.
Jansen, W., & Karygiannis, T. (1998). Mobile Agent Security, U.S. Department of commerce, NIST, Spec. Publ. 800-19, p. 44 (Oct. 1999), Gaithersburg, MD 20899-8930.
Derbas, G., Kayssi, A., Artail, H., & Chehab, A. (2004). Trummar-a trust model for mobile agent systems based on reputation. In Proceedings of the IEEE/ACS International Conference on Pervasive Services, 2004 (ICPS 2004) (pp. 113–120). IEEE.
Cubaleska, B., & Schneider, M. (2002). Applying trust policies for protecting mobile agents against DoS. In Third International Workshop on Policies for Distributed Systems and Networks (POLICY), Moterey, California.
Pujol, J. M., Sangüesa, R., & Delgado, J. (2002). Extracting reputation in multi agent systems by means of social network topology. In Proceedings of the First International Joint Conference on Autonomous Agents and MultiAgent Systems, Bologna, Italy.
Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14, 881–907.
Aggarwal, M., & Nipur, P. (2012). Hierarchal model to prevent DoS attack in mobile agents. In International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS-2012) Proceedings published in International Journal of Computer Applications®(IJCA) (pp. 0975–8887).
McDonald, J. T., & Yasinsac, A. (2006). Application security models for mobile agent systems. Electronic Notes in Theoretical Computer Science, 157(3), 43–59; In Proceedings of the First International Workshop on Security and Trust Management (STM 2005).
www.tryllian.com/technology-advancement-with-mobile-agentsoftware/12/05.2013.
Mármol, F. G., & Pérez, G. M. (2010). Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces, 32(4), 185–196.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Mittal, P., Mishra, M.K. (2018). Trust and Reputation-Based Model to Prevent Denial-of-Service Attacks in Mobile Agent System. In: Chakraverty, S., Goel, A., Misra, S. (eds) Towards Extensible and Adaptable Methods in Computing. Springer, Singapore. https://doi.org/10.1007/978-981-13-2348-5_22
Download citation
DOI: https://doi.org/10.1007/978-981-13-2348-5_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2347-8
Online ISBN: 978-981-13-2348-5
eBook Packages: Computer ScienceComputer Science (R0)