Journal of King Saud University: Computer and Information Sciences (Jan 2014)

Fragmentation based

  • Shashank Srivastava,
  • G.C. Nandi

DOI
https://doi.org/10.1016/j.jksuci.2013.08.002
Journal volume & issue
Vol. 26, no. 1
pp. 131 – 142

Abstract

Read online

Distributed applications provide challenging environment in today’s advancing technological world. To enhance the aspects of better performance and efficiency in real scenario mobile agent’s concept has been brought forward. As every technological movement is aligned with its repercussions, the mobile agent technology also has its inherent security loopholes. Usage of agent technology poses various security threats over networked infrastructure. Moreover numerous researches have already been proposed to take the edge off inherent security risk faced by mobile agent, but all these approaches did not resolve the malicious execution environment problem in permissible and effectual conduct. Gaining the understanding of mobile agent architecture and the security concerns, in this paper, we proposed a security protocol which addresses security with mitigated computational cost. The protocol is a combination of self decryption, co-operation and obfuscation technique. To circumvent the risk of malicious code execution in attacking environment, we have proposed fragmentation based encryption technique. Our encryption technique suits the general mobile agent size and provides hard and thorny obfuscation increasing attacker’s challenge on the same plane providing better performance with respect to computational cost as compared to existing AES encryption.

Keywords