کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
453540 | 694961 | 2010 | 6 صفحه PDF | دانلود رایگان |
In recent years, most of researchers are incorporating the mobile agents in most of the e-service applications especially in e-learning to improve the network latency and to reduce the network traffic. On the other side, the security issues degrade the mobile agent usage. The main intention of the attacker is to kill or modify the behavior of the agent in the middle of the journey to degrade the trustiness of the agent environment. To recover the killed or modified mobile agent in the original form, this paper proposed a novel K-response recovery model. For K-response recovery model, every host dispatching the agent should have the clone to recover the agent and send the response to the preceding host about the agent status (alive). During the recovery of the mobile agent all the components (agent code, itinerary, credential information, collected information and state) are able to recover. The K-response model is experimented for the 1-response scenario and its experimental results proved that the preceding host will get the response with in the time out period of the clone.
Journal: Computer Standards & Interfaces - Volume 32, Issues 1–2, January 2010, Pages 38–43