Skip to main content

Trust and Reputation-Based Model to Prevent Denial-of-Service Attacks in Mobile Agent System

  • Chapter
  • First Online:
Towards Extensible and Adaptable Methods in Computing

Abstract

Inside this paper, a trust and reputation-based model is proposed that a mobile agent system can implement to secure agent as well as the platform for malicious agent and platform. This model is unique in the protection of agent to the platform as well as the platform to agent denial-of-service attacks. The reputation of any platform can be calculated by taking the average trust values of all its mobile agents. JADE analysis shows the results that prove the uniqueness of this model in comparison with other models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lange, D.B., & Oshima, M. Introduction to mobile agents. General Magic Inc., Sunnyvale, California, USA.

    Google Scholar 

  2. Jansen, W., & Karygiannis, T. (1998). Mobile Agent Security, U.S. Department of commerce, NIST, Spec. Publ. 800-19, p. 44 (Oct. 1999), Gaithersburg, MD 20899-8930.

    Google Scholar 

  3. Derbas, G., Kayssi, A., Artail, H., & Chehab, A. (2004). Trummar-a trust model for mobile agent systems based on reputation. In Proceedings of the IEEE/ACS International Conference on Pervasive Services, 2004 (ICPS 2004) (pp. 113–120). IEEE.

    Google Scholar 

  4. Cubaleska, B., & Schneider, M. (2002). Applying trust policies for protecting mobile agents against DoS. In Third International Workshop on Policies for Distributed Systems and Networks (POLICY), Moterey, California.

    Google Scholar 

  5. Pujol, J. M., Sangüesa, R., & Delgado, J. (2002). Extracting reputation in multi agent systems by means of social network topology. In Proceedings of the First International Joint Conference on Autonomous Agents and MultiAgent Systems, Bologna, Italy.

    Google Scholar 

  6. Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14, 881–907.

    Article  Google Scholar 

  7. Aggarwal, M., & Nipur, P. (2012). Hierarchal model to prevent DoS attack in mobile agents. In International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS-2012) Proceedings published in International Journal of Computer Applications®(IJCA) (pp. 0975–8887).

    Google Scholar 

  8. McDonald, J. T., & Yasinsac, A. (2006). Application security models for mobile agent systems. Electronic Notes in Theoretical Computer Science, 157(3), 43–59; In Proceedings of the First International Workshop on Security and Trust Management (STM 2005).

    Google Scholar 

  9. www.tryllian.com/technology-advancement-with-mobile-agentsoftware/12/05.2013.

  10. Mármol, F. G., & Pérez, G. M. (2010). Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces, 32(4), 185–196.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Praveen Mittal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Mittal, P., Mishra, M.K. (2018). Trust and Reputation-Based Model to Prevent Denial-of-Service Attacks in Mobile Agent System. In: Chakraverty, S., Goel, A., Misra, S. (eds) Towards Extensible and Adaptable Methods in Computing. Springer, Singapore. https://doi.org/10.1007/978-981-13-2348-5_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2348-5_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2347-8

  • Online ISBN: 978-981-13-2348-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics