• Title/Summary/Keyword: Mobile Agent

Search Result 876, Processing Time 0.034 seconds

Network Management Architecture using Mobile Agent technology (Mobile Agent 기술을 이용한 네트워크 관리 구조)

  • 오양훈;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.4
    • /
    • pp.747-754
    • /
    • 1999
  • Mobile Agent is a movable software program that autonomously runs on behalf of its operator in a network environment. It has been widely applied to various kinds of computer engineering. In this paper, a network management architecture using the mobile agent technology in the distributed network environment is proposed. After manager system creates the mobile agent, it searches a proxy, a distributed object that acts as the substitute for a SNMP agent. In order to get the management information that manager requires, the mobile agent goes to the proxy and does operations on it. So, only the concise results from the operation are sent to the managing system. The proposed architecture is based on CORBA that provides several transparent characteristics in the distributed environment. In additional, the proxy object that represents the SNMP agent enables the mobile agent and the SNMP agent to converse with themselves. In this architecture, the mobile agent can carry out an automated management function, easily change and modify management functions. Therefore, it can provide an efficient management way.

  • PDF

A Reactive Planner-Based Mobile Agent System

  • Seok, Whang-Hee;Kim, In-Cheol
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.179-185
    • /
    • 2001
  • Mobile agents have the unique ability to transport themselves from one system in a network to another. The ability to travel allows mobile agents to move to a system that contains services with which they want to interact and then to take advantage of being in the same host or network as the service. But most of conventional mobile agent systems require that the users or the programmer should give the mobile agent its detail behavioral script for accomplishing the given task. And during its runtime, such mobile agents just behave according to the fixed script given by its user. Therefore it is impossible that conventional mobile agents autonomously build their own plants and execute them in considering their ultimate goals and the dynamic world states. One way to overcome such limitations of conventional mobile agent systems is to develop an intelligent mobile agent system embedding a reactive planner. In this paper, we design both a model of agent mobility and a model of inter-agent communication based upon the representative reactive planning agent architecture called JAM. An then we develop an intelligent mobile agent system with reactive planning capability, IMAS, by implementing additional basic actions for agent moves and inter-agent communication within JAM according to the predefined models. Unlike conventional mobile agents. IMAS agents can be able to adapt their behaviors to the dynamic changes of their environments as well as build their own plans autonomously. Thus IMAS agents can show higher flexibility and robustness than the conventional ones.

  • PDF

Active Rule Manager for the Mobile Agent Middleware System

  • Lee, Yon-Sik;Cheon, Eun-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.99-105
    • /
    • 2016
  • The active rule system is a key element of the rule-based mobile agent middleware system for activeness and autonomy of the sensor network. The rule manager, which is the main components of active rule based mobile agent framework and active rule system, performs the control and management of the rule-related processes. In this paper, we design and implement the roles and functions of the rule manager in detail. The proposed rule manager plays an important role in the sensor network environment. The sensor data server loads the active rule on the mobile agent by the rule manager according to the situations, and the mobile agent migrates to the destination node and performs the designated action. This active rule-based mobile agent middleware system presents the usefulness for the various sensor network applications. Through the rule execution experiment using the rule-based mobile agent, we show the adaptability and applicability of rule-based mobile agent middleware system to the dynamic environmental changes in sensor networks.

A Study for agent-based Integration Framework in mobile environment (모바일 환경에서 에이전트를 이용한 설계자원의 통합)

  • 옥형석;이수홍
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.193-196
    • /
    • 1997
  • A mobile computing environment has many difference in character from conventional communication over wired network. These include very presents distributed design system based the mobile agent for mobile computing environment. To integrate design resource, we presented ISA(Integration Service Agent, which allows a designer to build integrated application using distributed resources, and to collaborative by exchanging service. Also we propose ICM(XML based Intelligent Connection Manger) using mobile agent. And suggested new intelligent data and process transfer architecture using ICM to implement an agent based design system in mobile environment.

  • PDF

A Trust Center Based Secure Mobile Agent Transfer Protocol (신뢰 센터 기반의 안전한 이동 에이전트 전송 프로토콜)

  • 한승완;임형석
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.993-996
    • /
    • 1999
  • A mobile agent is a program which is capable of migrating autonomously from host to host in the heterogeneous network, to perform some computation on behalf of the user. Mobile agents have many advantages in the distributed computing environment. But they are likely to suffer many attacks on the security due to the mobility. In order to make use of a mobile agent in the real applications, the security issues must be addressed. We deal with the problem which is concerned with protecting a mobile agent in transit and detecting a mobile agent clone. In this paper we propose a trust center based secure mobile agent transfer protocol. This protocol transfers a mobile agent securely from host to host and detects a mobile agent clone. We further show the security of the protocol against many attacks.

  • PDF

A Suggest for Mobile Agent Security in Cross-Certification (상호인증이 가능한 Mobile Agent 보안기법에 관한 연구)

  • 서대희;박희운;이임영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.477-480
    • /
    • 2001
  • 무선 정보 환경의 변화에 따라 다양한 정보에 대한 풍족함이 요구되면서 양질의 정보를 정확하고 빠르게 선별하여 획득하는 기술이 점점 중요하게 되었으며, 이러한 페러다임의 요구에 Mobile Agent는 중요한 연구가 된다. 본 논문에서는 Mobile Agent가 가져야 할 보안적 요구사항 중 신뢰할 수 있는 Proxy Server를 이용한 인증을 통해 Sever와 Mobile Agent간의 안전한 통신 방법을 제시하며, Server나 Mobile Agent의 부정이 발견되었을 경우 DSS(Digital Signature Standard) 방식의 서명값을 이용하여 이를 증명함으로써 보다 안전하고 효율적인 상호인증 방식을 제안하였다.

  • PDF

Handoff Processing for Mobile Agent in Distributed Environment (분산 환경에서의 이동 에이전트 핸드오프 처리)

  • Park, Ki-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.815-820
    • /
    • 2001
  • This paper presents a distributed mobile architecture aimed to support the mobility of mobile station. The proposed architecture considers three significant objects;mobile station (MS), mobile agent (MA) which logically represents mobile station in the wireline network, and trace agent (TA) to represent application server (AS) providing application service to mobile station. The mobile agent is made closely coupled with the mobile station while the trace agent is made closely coupled with the application server. During the handoff process, a flow control mechanism is considered to correct packet loss and out-of-sequence packets problem. The result of analytic additional time delay due to handoff processing is presented and simulation was performed to check the additional time delay as well as the correctness of handoff algorithm.

  • PDF

Network Management System Based upon Mobile Agent using JNUI (JNDI를 이용한 Mobile Agent 기반 망관리 시스템)

  • 김정철;송왕철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.406-410
    • /
    • 1999
  • This paper supposes the SNMP network management system based upon Mobile Agent using the Naming and Directory Service, which is JNDI(Java Naming Directory Interface) technology. The Mobile Agent network system is expected to provide a solution for the conventional centralized network system. So, We have designed and implemented the network management system based upon Mobile Agent using JNDI

  • PDF

Design and Implementation of Java Based Mobile Agent Security System (자바 기반의 이동 에이전트 보안 구조 설계와 암호기능 구현)

  • 최길환;배상현
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.61-69
    • /
    • 2002
  • Big-bang growth of Internet and World Wide Web is supplying much information and resources to network. However, use of internet resources is receiving many limitations by bandwidth for most users. But, through Applet way, can solve degradation problem that follow on static side and bandwidth of CGI that HTML has. Mobile Agent starts in user's computer to accomplish user's specification purpose and achieves work rooving network. Because code that can perform so is transmitted, and is achieved in network through network, important problem happens to mobile code's security naturally. In computing environment that this research uses this Mobile Agent way that can protect host and agent groping report, describe problem that happen composing Mobile Agent relationship concept and Mobile Agent, and do so that may present method that is studying to solve these problem, and use method that application is possible actually among presented method and design transfer agent's security system.

  • PDF

Mobile Agent Protection Scheme through Execution Tracing of Agent Code and Status (에이전트 코드와 상태 추적을 통한 이동에이전트의 보호 기법)

  • 정창렬;고진광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.743-750
    • /
    • 2003
  • With the expansion of computer technology the mobility of a mobile agent code having the flexibility in the dispersive computer situation is used to set up the applications distributed on the Internet. As it also has the ability to transmit the mobile code of a mobile agent and to receive it from a far-off host, the executive circumstances of the host system in which an agent is executed have to access to an agent code and the executive state capable of executing an agent code. Therefore, it is difficult to prevent the forgery, the alteration and the wrong execution of an agent from a malicious host. This dissertation suggests the mechanism which can protect an agent from the malicious action through the executive pursuit of a code-named mobile agent. The security of this mechanism is verified through the protective process of a mobile agent in this mechanism.