You are on page 1of 14

MOBILE AGENT COMPUTATION

BYALOK SINGH ASHISH KUMAR SHARMA & ASHUTOSH TRIPATHI

1- Introduction. 2- Characteristics of mobile agents. 3- Advantages of mobile agent.

4- Mobile agents security threats.

1- INTRODUCTION
A mobile agent is specialized in that in addition to being an Independent program executing on behalf of a network user , it can travel to multiple locations in the network. As it travels , it performs work on behalf of the user, such as collecting information or delivering requests.

HOME PLATFORM

AGENT

AGENT

PLATFORM

AGENT

PLATFORM
AGENT SYSTEM MODEL

The agent platform provides the computational environment in which an agent operates. The platform from which an agent originates is referred to as the home platform , and normally is the most trusted environment for an agent. One or more hosts may comprise an agent plat form may support multiple computational environment , or meeting places , where agents can interact.

2-Characteristics of mobile agents

1- Situatedness
2- Autonomy 3- Flexibility
3.1- Responsive 3.2- Pro- active 3.3- Social

3-Advantages of mobile agent


1- They facilitate high quality, high performance, economical mobile applications. 2- Latency. 3- Fault tolerance. 4- They enable use of portable, low cost , personal communications devices. 5- Peer to peer communication. 6- They permit secure Intranet- style communications on public networks.

7- Bandwidth-

App

Service

App

Service

8- Asynchronous task execution-

App

Send agent

Service

Disconnect
App
RECONNECT & RETURN

Service

App

Service

4-MOBILE AGENTS SECURITY THREATS


Threats to security generally fall into three main classes: disclosure of information , denial of service , and corruption of information.
4.1-

agent to platform-

The agent to platform category represents the set of threats in which agents exploit security weakness of an agent platform or launch attacks against an agent platform.

A- masquerading. B- denial of service. C- unauthorized access.

4.2- AGENT TO AGENT- The agent to agent


category represents the set of threats in which agents exploit security weakness of other agents or launch attacks against other agents.

SET OF THREATS INCLUDES:A- Masquerading


B- Denial of Service C- Repudiation D- Unauthorized Access

4.3- PLATEFORM TO AGENT:The platform to agent category represents the set of threats in which platform compromise the security of agents. And set of threats areABCDmasquerade denial of service eavesdropping alteration

4.4- other to agent platform:The other to agent platform category represents the set of threats in which external entities, including agents platforms, threaten the security of an agent platform. Set of threatsABCDmasquerade unauthorized access denial of service copy and replay