Article ID Journal Published Year Pages File Type
453540 Computer Standards & Interfaces 2010 6 Pages PDF
Abstract

In recent years, most of researchers are incorporating the mobile agents in most of the e-service applications especially in e-learning to improve the network latency and to reduce the network traffic. On the other side, the security issues degrade the mobile agent usage. The main intention of the attacker is to kill or modify the behavior of the agent in the middle of the journey to degrade the trustiness of the agent environment. To recover the killed or modified mobile agent in the original form, this paper proposed a novel K-response recovery model. For K-response recovery model, every host dispatching the agent should have the clone to recover the agent and send the response to the preceding host about the agent status (alive). During the recovery of the mobile agent all the components (agent code, itinerary, credential information, collected information and state) are able to recover. The K-response model is experimented for the 1-response scenario and its experimental results proved that the preceding host will get the response with in the time out period of the clone.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,