Work place: MGM College of Engineering and Technology, Noida/ Department of computer Science and Engineering, Uttar Pradesh, 201301, India
Research Interests: Network Security, Blockchain technology
Mohammad Asim is a PhD Scholar in Computer Science and Engineering at Sharda University Greater Noida. He has obtained M. Tech in Computer Engineering from Shobhit Institute of Engineering & Technology (Deemed-to-be University) Meerut. He has completed BTech(CSE) from U.P. Technical University, Lucknow. His area of research includes Wireless Technology, Blockchain Technology, Mobile Ad-hoc Network and Cryptography & Network Security.
DOI: https://doi.org/10.5815/ijcnis.2023.06.03, Pub. Date: 8 Dec. 2023
A mobile agent is a small piece of software which works on direction of its source platform on a regular basis. Because mobile agents roam around wide area networks autonomously, the protection of the agents and platforms is a serious worry. The number of mobile agents-based software applications has increased dramatically over the past year. It has also enhanced the security risks associated with such applications. Most of the security mechanisms in the mobile agent architecture focus solely on platform security, leaving mobile agent safety to be a significant challenge. An efficient authentication scheme is proposed in this article to address the situation of protection and authentication of mobile agent at the hour of migration of across multiple platforms in malicious environment. An authentication mechanism for the mobile agent based on the Hopfield neural network proposed. The mobile agent’s identity and password are authenticate using the specified mechanism at the moment of execution of assigned operation. An evaluative assessment has been offered, along with their complex character, in comparison to numerous agent authentication approaches. The proposed method has been put into practice, and its different aspects have been put to the test. In contrasted to typical client-server and code-on-demand approaches, the analysis shows that computation here is often more safe and simpler.[...] Read more.
Subscribe to receive issue release notifications and newsletters from MECS Press journals