• Title/Summary/Keyword: mobile agent systems

Search Result 204, Processing Time 0.022 seconds

An Efficient Proxy-Signcryption Scheme for Mobile Communications (이동통신 환경에 적합한 효율적인 Proxy-Signcryption 방식)

  • 김동우;박지환
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.518-526
    • /
    • 2003
  • According to the development of mobile communications, the future mobile communication systems are expected to provide high quality multimedia service to users. Therefore, many technical factors we needed in these systems. Especially the confidentiality and the security would be obtained through the introduction of the security for mobile communications. In this paper, we propose an efficient Proxy-Signcryption scheme, which can be performed digital signature and encryption by using the proxy agent who has more computational power under mobile communications environment. The proposed scheme provides non-repudiation and prevents creating illegal signature by the origin and proxy agent in a phase of proxy signature processing. This scheme also keeps the confidentiality and the security in mobile communication by means of confirming the signature by right receiver.

  • PDF

A Mobile IP Handover Scheme Based on Routing Costs (라우팅 비용을 고려한 Mobile IP 핸드오버 방안)

  • Park, Hee-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.178-185
    • /
    • 2008
  • This paper proposes a new handover scheme to minimize handover delay and signaling costs, using the fact that a new packet forwarding path could be same or similar to the old one in Mobile IPv4. In the proposed scheme a foreign agent estimates the correlation between the new and old routing paths by using routing costs after receiving a registration request message from a mobile node. If the new packet forwarding path could be same or similar to the old one, the mobile node can receive packets from its old foreign agent without registering its new location with its home agent or correspondent node. The performance analysis shows that the proposed scheme can efficiently reduce handover delay and signaling costs.

  • PDF

Human Hierarchical Behavior Based Mobile Agent Control in Intelligent Space with Distributed Sensors (분산형 센서로 구현된 지능화 공간을 위한 계층적 행위기반의 이동에이젼트 제어)

  • Jin Tae-Seok;Hashimoto Hideki
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.12
    • /
    • pp.984-990
    • /
    • 2005
  • The aim of this paper is to investigate a control framework for mobile robots, operating in shared environment with humans. The Intelligent Space (iSpace) can sense the whole space and evaluate the situations in the space by distributing sensors. The mobile agents serve the inhabitants in the space utilizes the evaluated information by iSpace. The iSpace evaluates the situations in the space and learns the walking behavior of the inhabitants. The human intelligence manifests in the space as a behavior, as a response to the situation in the space. The iSpace learns the behavior and applies to mobile agent motion planning and control. This paper introduces the application of fuzzy-neural network to describe the obstacle avoidance behavior teamed from humans. Simulation results are introduced to demonstrate the efficiency of this method.

A Digital Nominative Proxy Signature Scheme for Mobile Communication (이동 통신에서 적용 가능한 수신자 지정 대리 서명 방식)

  • 박희운;이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.2
    • /
    • pp.27-35
    • /
    • 2001
  • Based on the development of mobile communication, the future mobile communication systems are expected to provide higher quality of multimedia services for users than today\`s systems. Therefore, many technical factors are needed in this systems. Especially the secrecy and the safety would be obtained through the introduction of the security for mobile communication. In this paper, we presents a digital nominative proxy signature scheme that processes a user\`s digital signature and encryption using the proxy-agent who has more computational power than origins in mobile communication. The proposed scheme provides non-repudiation and prevents creating illegal signature by the origin and proxy-agent in a phase of proxy signature processing. Also this scheme satisfies the confidentiality and safety in the mobile communication through a confirming signature by the right receiver.

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.

Design & Implementation of Secure Mobile Agent Gateway (안전한 이동 에이전트 게이트웨이의 설계 및 구현)

  • Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.2
    • /
    • pp.240-249
    • /
    • 2002
  • In the course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is use of mobile agents. The mobile agent is capable of migrating autonomously from node to node in the network, to perform some computation on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It also however, suffers from a major drawback, namely, the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describe the design & implementation of secure mobile agent gateway that split and merge the agent cede with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

A Forgery detection protocol for protection of mobile agent execution results (이동 에이전트 수행 결과에 대한 부정 검출 프로토콜)

  • Kim, Hee-Yeon;Shin, Jung-Hwa;Shin, Weon;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.517-522
    • /
    • 2002
  • Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.

A Mobile Agent-based Grouping Method for enhancing Performance of Mobile Database Management Systems (모바일 데이터베이스 관리 시스템의 성능향상을 위한 이동 에이전트 기반 그룹핑 기법)

  • Shin, Sung-Oog;Jeong, Dong-Won;Lee, Jeong-Oog;Baik, Doo-Kwon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.375-386
    • /
    • 2003
  • A rapid growth of mobile devices and a proliferation of wireless networks lead to changing the existing environment into a mobile environment. Expansion of mobile environment makes a pressing need of mobile databases, and there are several solutions to achieve it. But they still accompany with some problems. Especially, the current synchronization server that manages consistently many mobile database management systems is based on the centralized method to synchronize data between the mobile database systems. It is the major factor that causes the lower performance of the whole system. Furthermore, the fault tolerance has not been considered in the existing systems. Therefore, we suggest the mobile agent-based mobile database system in order to resolve the problems. The system, we propose in this paper, provides the high-performance of the whole system by mobile grouping, and also may support a fault-tolerance management method.

Advance of Agent Age (에이전트의 시대가 오고 있다)

  • Lee, Keun-Sang
    • Journal of Information Management
    • /
    • v.31 no.4
    • /
    • pp.71-87
    • /
    • 2000
  • Recently, researches of mobile agent systems have done actively to enhance usability of heterogenenous environment linked via network and to solve problems of existing distributed-object computing. Though these research and development many studies have done to be applicated to many areas that are existing distributed systems as well as E-commerce, network maintenance, and information retrieval etc. This paper reviews some related issues to agent studies, comprehensive studies to enhance telecommunication functionality among agents, and future and application fields of agent.

  • PDF